AY 97 COMPENDIUM ARMY AFTER NEXT PROJECT

advertisement
AY 97 COMPENDIUM
ARMY AFTER NEXT PROJECT
Yves J. Fontaine
Paul T. Hengst
Barbara A. Jezior
William T. Lasher
Gary J. Motsek
Arthur J. Sosa
Billy E. Wells, Jr.
Edited by
Douglas V. Johnson II
April 6, 1998
*****
The views expressed in this report are those of the authors and do
not necessarily reflect the official policy or position of the Department of
the Army, the Department of Defense, or the U.S. Government. This
report is cleared for public release; distribution is unlimited.
*****
Comments pertaining to this report are invited and should be
forwarded to: Director, Strategic Studies Institute, U.S. Army War
College, 122 Forbes Ave., Carlisle, PA 17013-5244. Copies of this report
may be obtained from the Publications and Production Office by calling
commercial (717) 245-4133, DSN 242-4133, FAX (717) 245-3820, or via
the Internet at rummelr@carlisle-emh2. army.mil
*****
Selected 1993, 1994, and all later Strategic Studies Institute
(SSI) monographs are available on the Strategic Studies Institute
Homepage for electronic dissemination. SSI’s Homepage address is:
http://carlisle-www.army.mil/usassi/welcome.htm
ii
CONTENTS
Foreword . . . . . . . . . . . . . . . . . . . . . . . . . . v
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . vii
1. The Future of Infantry: Maneuver in the 21st Century
Billy E. Wells, Jr. . . . . . . . . . . . . . . . . . . . 1
2. The Revolutionized Warfighter Circa 2025
Barbara A. Jezior . . . . . . . . . . . . . . . . . . . 37
3. Unmanned Aerial Vehicles: Promises and Potential
Arthur J. Sosa . . . . . . . . . . . . . . . . . . . . 53
4. Strategic Logistics for Intervention Forces
Yves J. Fontaine . . . . . . . . . . . . . . . . . . . 75
5. Logistic Support to the Army After Next Warfighters:
A Time for Fundamental Change
Gary J. Motsek . . . . . . . . . . . . . . . . . . . . 93
6. Managing the Intelligent Information Grid
for the Army After Next
Paul T. Hengst. . . . . . . . . . . . . . . . . . . . 111
7. Data Interoperability for Systems of Systems: Our
Acquisition Paradigm Must Change to Achieve It
William T. Lasher . . . . . . . . . . . . . . . . . . 135
About the Authors . . . . . . . . . . . . . . . . . . . . 155
iii
TABLE AND FIGURES
Table 1. UAV Joint Program Office Payload Projects . 64
Figure 1. Proliferation of UAVs . . . . . . . . . . . . . 66
Figure 2. Illustration of a System of Systems . . . . . 137
Figure 3. Communicating Between Systems . . . . . 138
Figure 4. The Waterfall Life Cycle Model . . . . . . . 141
Figure 5. Military Standard 498 Software Development
Cycle . . . . . . . . . . . . . . . . . . . . . 142
Figure 6. The Functional Pie: Illustrative Slices . . . 143
Figure 7. Enterprise Data Architecture . . . . . . . . 148
Figure 8. Possible Layout for DoD Data Management
Organization . . . . . . . . . . . . . . . . . 149
iv
FOREWORD
This compendium of student papers is the first in an
annual series generated by the U.S. Army War College
Special Program, the Army After Next Seminar. This
seminar is a continuing research effort involving students,
staff, and faculty that attempts to wrestle with the nature of
military power 30 years into the future. This is a difficult
task with no known “Right” or “Wrong” markers. Michael
Howard, in his seminal article, “Military Science in an Age
of Peace,” tells us that the task of the professional soldier in
time of peace is to try to figure out the future in such a
fashion that, when it arrives, he won’t be so far wrong as to
be unable to take corrective action quickly.
These student papers are largely focused on present
problems which must be solved before movement toward
the future can make much progress. If they are not
dramatically futuristic in approach, they are nevertheless
set against a future backdrop which is still in the process of
being defined. The broader Army After Next program, led by
the U.S. Army Training and Doctrine Comand, is an
experiment, an examination of what could be. The Army
War College seeks to play its part through this contribution
and by educating those officers who will field, staff, and
command our future Army.
RICHARD H. WITHERSPOON
Colonel, U.S. Army
Director, Strategic Studies Institute
v
PREFACE
This collection of essays reflects the state of future
thinking by selected students of the U.S. Army War College
Class of ‘97. Before summarizing the papers contained
herein, it is informative to recap student papers for the
entire class. There were a number of surprises. This year
saw a deep interest in Reserve Component (RC)
contributions to National Security, Information Operations
broadly defined, Logistics, and the full range of “Not-War”
situations. Of 300-odd papers, 20 were focused on Logistics,
26 on Information Operations, 17 on RC issues, and 15 on
“Not-War” issues. In addition, there were 14 focused on
aspects of the Future Army not specifically included within
these other categories. However, when we use the Future
Army as a primary category, the number of papers jumps
somewhat to around 50, depending upon how rigorously one
defines “Future Army.” This compendium reflects this focus
of interest.
It is essential that the reader understand the general
qualifications of our authors. Most of these authors are
Army officers with about 22 years of commissioned service.
They are practical men and women despite their broad
educational backgrounds. Most hold a master’s degree in
some discipline, but have had little opportunity to theorize
and mature their thinking about great political
issues—their job has always been to prevent problems or
solve them when things go awry. Consequently, this volume
contains no treatises on international relations nor
analyses of macro-trends in global relationships. Perhaps
that is a fault of the curriculum, but the nation does not pay
officers to think those thoughts; by a wonderful quirk of
logic, it chooses to elect others to do that.
The idea of a “Military After Next” seems first to have
surfaced in an article published in the Washington
Quarterly in 1993 by Paul Bracken. Within a year, U.S.
vii
A rmy C h ief of Staf f Gener al Denni s J. Rei mer
commissioned Headquarters, Training and Doctrine
Command (TRADOC), to begin an exploratory program to
investigate the possible shape and behavior of the Army in
the 2025 time frame. Almost simultaneously, the Strategic
Studies Institute (SSI) of the U.S. Army War College
(USAWC) sought and obtained approval to put together a
Special Program (actually an extended Advanced Course)
entitled “The Army After Next,” as a parallel experiment
with full academic freedom to read, think, and debate the
breadth and depth of the plausible. Twelve students were
selected for the program from a group of 30 volunteers.
Some of their papers are included in this volume; but other
students worked similar issues on their own initiative, and
the lead paper in this compendium is one of those.
The structure of this compendium is as follows:
Lieutenant Colonel Wells’ paper is a wide-ranging,
impassioned presentation of the future of infantry. Branch
parochialism aside, it serves as a thought-provoking
baseline by which the other papers should be evaluated, for,
in the end, real war is about infantry. Wells’ presentation
leads logically to the Land Warrior program which Ms.
Barbara Jezior, as the second author, explains in depth,
treating the combat soldier as a whole system.
Ms. Jezior, who was invited to stay on at USAWC for a
year and teach, describes the course of developments in
soldier systems. Late in the academic year the Army After
Next (AAN) Seminar took up issues of operations and
tactics, using Ms. Jezior’s paper as a springboard. If the
Army chooses to pursue the Land Warrior system, it will
give the individual soldier significantly greater influence on
the battlefield. But in combination with other similarly
equipped soldiers and support measures, the Land Warrior
system promises a quantum leap in battle effectiveness.
After extended debate, the AAN Seminar more or less
agreed that the basic unit of Land Warriors ought to be a
“squad” of about seven persons, two teams of three and a
leader. Note how this contrasts with Wells’ argument for a
viii
somewhat larger group. The next level of aggregation,
however, was thought to be about four such “squads.”
Whether this unit would be a company or platoon was not
considered relevant; what was more important was the
amount of ground such a unit could control. When
augmented by Unmanned Aerial Vehicles (UAV) and
advanced antitank weapons, one “squad,” in the Seminar’s
estimation, could control the entire Gettysburg battlefield
(vice the 165,000 men who strove there in 1863), and that a
group of four of these squads could control the entire battle
area, about a 15-by-15-mile square. Next year the Seminar
will spend more time considering how the Land Warrior
system would work in urban combat, and what force levels
would be required there—more, we suspect.
Ms. Jezior describes the current state of Land Warrior
system development and outlines some of the more
visionary things being considered. In its current state of
development, Land Warrior allows its user to “see” and
engage around corners, to see and engage in most conditions
of visual obscurity, to maintain significant situational
awareness of the immediate operational area, and to
communicate laterally and vertically in a semi-automatic
mode. Not yet, but soon, his battledress will be chemical
agent resistant with automatic alarm and prophylactic
mechanisms, and, later, biological agent resistant.
Biomedical function monitoring is part of the suit, and
biomedical enhancements will be incorporated once
adequately tested. The list grows as time and money
increase, but therein lies one of the major limiters. Such
battle suits will not be cheap, and their cost may prove the
primary limiting factor.
Lieutenant Colonel Arthur Sosa, an Army aviator with a
deep interest in UAVs, provides a good look at their
background and development. He does not address the overt
connections between these systems and the soldier, but the
reader will make those connections readily. The application
of UAVs to each level of war will prove a significant
capability enhancer. At the “squad” level, it is well within
ix
the plausible to think of the following scenario. One Land
Warrior is alerted by UAV reconnaissance to some
suspicious activity three miles to his west. Reaching into his
backpack quiver of micro UAVs, he programs one for
“Search-human/military material,” and launches it toward
the hot spot. The nearly silent, negligible cross-section
sensor darts out to scan the area, detects human movement,
reports the result of an Identification Friend or Foe (IFF)
inquiry and awaits further instructions. Those instructions
could include return to launch point, mark target, or
kamikaze. If the object is a hard target requiring an
Enhanced Fiber Optic Guided Missile (EFOGM) or other
fire strike, the UAV may remain long enough to do
post-strike battle damage assessment (BDA). In short, the
UAV has the capacity to expand the soldiers’ control of the
battlefield in the same exponential fashion as the armed
helicopter. In fact, mainstream Army thinking, at least as
represented by USAWC students, reveals very limited
conceptions of what UAVs already have done, much less
how much they can do. The limitation of this technology
appears to be principally human. Humans must eat, sleep,
and have some social interaction, especially in stressful
situations.
Because the soldier will always find employment in a
wide range of circumstance, the next piece is by a
logistician, Lieutenant Colonel Yves J. Fontaine, who
addresses the persistent shortcomings in the soldier’s
support system in a variety of recent operations. He reviews
the logistics shortcomings of recent operations in order to
describe the challenge of creating a needed revolution in
logistics operations. His descriptions of the logistical
problems within these successful operations demonstrate
the potential for significant improvements, many of which
are possible in the near future. One can see in the
management concepts Fontaine describes pathways toward
implementation of the broader concepts in Colonel Gary
Motsek’s paper that follows. Fontaine’s hard-nosed analysis
concludes:
x
Nevertheless, the level of technology available today (and
probably in 2025) does not significantly change the way we do
business as logisticians. Current technology allows us to
improve . . . to process faster . . . [It] does not mean the U.S. Army
can decrease the logistics tail.
This may be Fontaine’s most important conclusion.
Unless radically new systems are developed that require
little logistics support, all improvements in logistics
systems will continue to be at the margin.
Colonel Gary J. Motsek also addresses logistics. In his
monograph titled, “Logistic Support to the Army After Next
Warfighters,” he argues that the time for change in logistics
operations is now. Leaning upon the Chairman of the Joint
Chiefs of Staff’s Joint Vision 2010 as a starting point,
Colonel Motsek argues that major changes in logistics
management are already underway, but that further
change is essential. He points out that we do not know the
exact dimensions of the Army After Next force, but we do
know it will be a smaller, faster moving force, both
strategically and tactically. We may reasonably assume it
will be well-equipped with information technology that
significantly improves all facets of situational awareness.
His interest, of course, is focused on how that awareness will
translate into near-immediate response to logistics needs in
a very fluid environment. He goes on to caution that only so
much change is possible as long as the current weapons
system mix obtains. A 70-ton M1 tank has requirements
that cannot be met by anything less than large quantities of
fu el, ammu n ition, and heavywei ght c omp onent
transporters. Colonel Motsek carefully points out that the
Army After Next is likely to be responsible as executive
agent for many items of supply for the other services, as is
today’s Army. Part of his solution to is to reorganize the
logistics world to establish a national level logistics
provider. This concept capitalizes on the idea of centralized
management and decentralized execution. All logistics
stocks are centrally managed, as are Transportation
Command’s (TRANSCOM) assets, today. Commander-
xi
in-Chief TRANSCOM (CINCTRANS) “is the single
Department of Defense point of focus to contract and
leverage civilian transportation resources” as well as
military lift assets. He concludes that there will be funding
obstacles in modernizing the force that will likely
necessitate the ability to support several generations of
force structure; that the tactical transportation challenge
will likewise impose an expense in the development of the
force; and that the idea of a Commander-in-Chief Logistics
(CINCLOG) needs considerable development.
Whatever the strategic situation, whatever the combat
mode, the soldier will be utterly dependent upon
information technology. Lieutenant Colonel Paul T. Hengst
presents an overview of some of the technical aspects,
focusing on the Intelligent Information Grid (I2G) upon
which the AAN will be dependent. This I2G will form “a
single grid so powerful and intelligent that it will be able to
provide common situational awareness to friendly forces,
real-time intelligence on enemy forces and fire control.” In
order to establish this tool, which functions as the central
n erv ou s sy stem f or mi l i tar y f or c es , two major
improvements must occur:
•
•
Technology. Artificial intelligence must become a
reality for management functions within the grid,
multi-level security is a must, and database
technology management must become more
responsive.
Management. The I2G will operate off of commercial
systems with all that entails; the funding stream to
maintain competitive position within the commercial
structure must be maintained; and DoD must
establish a central management organization to focus
resources according to development priorities so as to
acquire the most effective systems when needed, and
to reduce training and interoperability problems.
xii
Finally, Lieutenant Colonel William T. Lasher discusses
information management systems and some of the existing
issues and proposed resolutions thereto. His basic point is
that, until we commit fully to developing a system of
systems in information, we will confront unnecessary
obstacles to the kind of information flow a really
revolutionized military requires.
There were 6-10 other papers that might have been
included, and segments of 12 or so others that addressed
future military matters, but space constrained selection.
What is reassuring is the high percentage of largely
future-focused studies, what is discouraging, although
understandable in the program’s first year, is the general
inability to push thinking out into the timeframe of our sons’
and daughters’ military careers. Nonetheless, this
compendium represents a good first effort to grapple with
the long range future in a program that we expect to see
mature over the next decade at least.
DOUGLAS V. JOHNSON II
Army After Next Project Coordinator
Strategic Studies Institute
xiii
CHAPTER 1
THE FUTURE OF INFANTRY:
MANEUVER IN THE 21st CENTURY
Billy E. Wells, Jr.
[Editor’s Note: This paper ranges widely and
passionately over the entire realm of infantry, but it does so
in light of the most recent warfighting experiments and
advances in infantry related technologies. As noted in the
text, several of the following papers are directly related to
the author’s arguments. Where these arguments are
duplicative, I have opted to direct the reader to the broader
following articles. While not entirely focused upon Army
After Next, this paper lays the base case from which any
geopolitical situation requiring the use of military force
must begin. It is comprehensive in its address of technology,
training, education, and leader development. Other papers
address the required elements of command and control, and
sustainment. DVJ]
INTRODUCTION
The thesis of this paper is that highly mobile infantry
forces combined with increasingly lethal artillery and
aviation will be the dominant land combat force of the
future. This will occur as the geopolitical environment
evolves a new set of conditions requiring capabilities
traditionally associated with infantry. At the same time,
domestic requirements will continue to shape the direction
of national strategy and force structure, focusing on lighter,
more economical dual use technologies and forces. As
technological developments create the requirement and the
capability for a dispersed and expanded battlefield, mobility
requirements will expand the roles of aviation due to its
speed and of artillery due to its range. Infantry, by merging
1
dismounted mobility with aviation and providing targeting
information to artillery even in close terrain, will be the key
to full spectrum dominance. How the infantry force is
selected, organized, trained, employed, and supported will
require significant changes in order to meet the challenges
of future conflict.
THE ROLE OF INFANTRY
Throughout history the infantry has remained the most
flexible arm because it can fight in so many ways and places.
No other component of the ground force can perform the
wide range of infantry missions. Aviation cannot occupy and
hold terrain and cannot operate continuously. Armor is
partly deaf and blind, increasingly restricted by terrain,
difficult to conceal, vulnerable to an expanding variety of
weapons, impossible to deploy rapidly, and difficult to
sustain. Artillery, although increasing its capabilities, is
incapable of engaging small fleeting targets at close range
without endangering friendly personnel. Like armor,
artillery is of limited use in certain environments and of
little value in most military operations other than war.
The basic combat mission of the infantry is unlikely to
change in the long term. Infantry will continue to “close with
the enemy by means of fire and maneuver to defeat or
capture him, or to repel his assault by fire, close combat, and
counterattack.” In order to accomplish this mission,
infantry performs six critical tasks: find, fix, finish, disrupt,
protect, and control. Although these tasks may be
accomplished alone, they are usually done in concert with
the other arms and services.
Infantry has always played an important role in gaining
contact with the enemy. Traditionally an aspect of battle
dominated by cavalry, this critical function is essentially an
infantry task in close terrain and at the low end of the
spectrum of conflict. Even in open terrain, infantry may be
the force of choice due to its low signature, if it can be placed
in proper position with good communications.
2
Despite the expanded capability of current and projected
sensors, close terrain (or poor visibility) still restricts their
use. While there are developmental programs targeted at
foliage penetration, they are not likely to solve the visibility
problem for urban terrain or to be able to distinguish
combatants from noncombatants.1
Once found, the enemy is usually fixed to facilitate his
destruction. The requirement to fix enemy forces is as old as
warfare. Fixing allows “time dominance” of the enemy.
When an enemy force is fixed, it loses flexibility and
initiative and leaves itself vulnerable to the massing of
destructive effects. Infantry is not the only force capable of
fixing; however, it is the most capable one, especially when
combined with other arms. The requirement to fix
diminishes in importance proportionally with real time
situational awareness and response capability. Even with
perfect situational awareness, however, fixing the enemy
facilitates the massing of effects.
Infantry forces are required to finish the battle however
it may be fought. Other forces are incapable of clearing the
terrain required to consolidate victory and have difficulty in
capturing enemy personnel. The implication that infantry
must always come to grips with the enemy to finish him is
misleading. While close combat is the essential infantry
task, weapons developments clearly indicate that in certain
conditions infantry will fight at extended ranges. The
meaning of closing with the enemy must be modified to
include long range engagements and “fire fights” along with
its traditional implication of bayonet and rifle butt.
Disruption is traditionally a light force function,
whether cavalry or infantry, and multiplies the effect of
combat power by creating vulnerabilities and destroying
enemy synchronization. In essence, disruption magnifies
the friction of war for the enemy. Infantry, by virtue of its
exceptional mobility and low signature, acts as an excellent
disrupter. Infantry has increasing potential to expand this
role with aviation support.
3
Protection of valuable resources remains a critical
infantry task across the spectrum of conflict. Fire support
and air defense commanders habitually request infantry
security forces to reduce their vulnerability to ground
attack. From fortress troops to fire bases in Vietnam to
aviation forward operating bases in Operation DESERT
STORM, infantry support has been critical to protecting
valuable assets. Even mobile armored forces require
infantry for security. Today’s crew-served systems do not
possess the personnel depth to maintain constant 24-hour
security and must have infantry for close-in protection and
early warning, especially in close terrain or bad weather.
This requirement is expanding as the battlefield becomes
more non-linear.
Control of populations and critical terrain is an infantry
intensive and essential function either in combat or in
increasingly prevalent operations other than war. The
closer the terrain and the larger the population, the greater
the requirement for infantry.
As requirements for infantry increase, solutions must be
found to meet the future challenges of full spectrum
dominance. In some cases, technology can actually expand
the individual soldier’s battlespace. In others, such as close
terrain and population control, technology can certainly
make the individual soldier more effective, but it cannot
reduce the personnel requirement for the foreseeable
future. A review of current and future infantry systems and
their capabilities will reveal some striking future
possibilities.
TECHNOLOGICAL DEVELOPMENTS
Incredibly, the infantry appears to be gaining the most
from changes in technology and emerging global trends. An
examination of research and development efforts clearly
indicates it to be one of the most rapidly advancing forces in
terms of lethality, mobility, and information capability.
Technological innovations and mobility combinations with
4
other arms are revolutionizing the future infantry
battlefield.
Antitank Weapons.
Infantry antitank weapons represent some of the most
dramatic advances in capability across the force. The ability
of individual infantry soldiers and small crews to destroy
armor beyond tank gun range is dramatically changing the
combat power equation. Four air transportable systems,
Javelin, Follow on to TOW Missile (FOTT), Line of Sight
Antitank (LOSAT), and the Enhanced Fiber Optic Guided
Missile (EFOGM), are dramatically changing the open field
advantage in favor of the easily concealed and increasingly
lethal infantryman.
The Javelin began fielding in 1996 as part the Force XXI
Army Warfighting Experiment (AWE). Representing a
tremendous leap ahead capability for the infantryman
compared to the M47 Dragon, the Javelin has an integrated
day-and-night sight. Passive infrared fire control with a
lock-on before launch provides a “fire and forget” capability.
Either top attack or direct fire modes may be selected for
defilade targets. With a 2000+ meter range and a soft
launch capability for firing from enclosures, Javelin
represents a powerful new antitank capability for the rifle
platoon.2
The TOW weapon system is receiving various missile
and target acquisition upgrades as well. The FOTT missile
is designed to reach about six kilometers with a lock-on
before launch and “fire and forget” capability similar to the
Javelin. Capable of defeating known and expected future
threat armor, it will also be capable of overcoming predicted
threat countermeasures as well. The improved target
acquisition system for TOW with second generation
Forward Looking Infrared (FLIR) and laser range finder
enhance the crew’s capability to acquire targets and to
compensate for incorrect range determination.3
5
The most deadly direct fire antitank weapon system
under development is the LOSAT which takes advantage of
kinetic missile technology to fire a 170-pound, 112-inch-long
“telephone pole” at 5000 feet per second through an armored
vehicle. With a range beyond TOW and a capability to
engage multiple targets, this system represents a decided
advantage against any known or predicted future tank and
antitank missile countermeasure system. Originally
designed for mounting on the now defunct armored gun
system chassis, it can be mounted on the heavy version of
the High Mobility Multi-purpose Wheeled Vehicle
(HMMWV), giving it an air assault/air mobile capability.
The EFOGM is designed to destroy tanks and rotary
wing aircraft defiladed by terrain out to 15 kilometers. This
system is HMMWV mounted as well. Like LOSAT, its
two-man crew and vehicle are air assault capable. Target
acquisition is FLIR with Global Positioning System (GPS)
inertial measurement for accurate target location, allowing
the system to serve as a reconnaissance asset while en route
to its own target. With six missiles carried ready to fire and
12 systems planned for a brigade sized maneuver force,
EFOGM will give small, agile light forces a decided
advantage over slower armored units. By using terrain
obstacles to impede movement and obstruct line of sight, the
lighter force completely deprives the heavy force of its
capability to locate and engage it.5
Directed Energy.
Directed energy weapons go beyond the current
capabilities of kinetic and chemical energy capabilities to
defeat armor. Directed energy uses lasers or high power
microwave systems to disrupt enemy electronics and fire
control optics in an asymmetrical attack. The weapon
strikes at the speed of light at ranges far beyond current or
projected tank main guns. Operating in a scan mode, an
invisible laser searches the battlefield for optics. In a
manner similar to the way radar reflects back to its source
and identifies a target location, the laser detects optics
6
ranging from binoculars to tank fire control equipment. In
the attack mode, it can disrupt these same systems by
transmitting a high energy beam which glazes optics and
destroys FLIR systems.
Because it requires only electrical energy to operate,
logistical requirements are essentially limited to
sustainment of the weapons platform. This could be
anything from an infantry fighting vehicle to the individual
soldier. While there are ethical issues associated with the
attack aspects of this system (it can cause blindness), its
target acquisition role is worthy on its own merits. It can
provide precise target locations for both direct fire and
indirect systems. When employed in the attack mode, it
eliminates the requirement for expensive precision guided
munitions altogether. In the detection mode during
Operation Other Than War (OOTW), directed energy can
identify surveillance efforts by insurgents and is effective in
locating snipers.6
Directed energy is not a drawing board item. Two
Bradley mounted Stingray directed energy systems were
built in 1991 and deployed to DESERT STORM (results, if
any, remain classified). Two other systems, the Outrider, a
HMMWV mounted version of Stingray for light forces, and
the Target Location and Observation System (TLOS) were
also planned by the Army; however, the Outrider project
was canceled.7
Scheduled for fielding in 1998 with three systems per
rifle platoon, the TLOS could revolutionize the battlefield.
TLOS is an M-16 mounted device that detects fire control
systems, both optical and FLIR, by using a laser scanner to
search the battlefield. Weighing 6.5 pounds, the system can
detect at ranges of 2500 meters during the day and 3000
meters at night. The final, lighter weight version will have
digital integration and GPS and will compute range to
target. This system can also destroy optics, though current
systems have had this capability removed.8
7
The impact of such a weapon in the hands of an
individual infantry soldier would be enormous. The fire
control system of any armored vehicle or aircraft within
sight could be destroyed. Constraints have been placed on
this capability by the Department of Defense, however. As
mentioned above, there are ethical issues surrounding the
use of such a weapon, as it can blind people. Since similar
ethically-driven restraints on the crossbow and gunpowder
were not successful, we can expect similar systems to
appear in other countries as an effective asymmetrical and
cheap counter to our technological advantage in the air and
on the ground.
Nonlethal Weapons.
Microwave sound weapons range from lethal to
nonlethal. In the nonlethal mode, these weapons create
imbalance and disorientation through effects on the inner
ear and can incapacitate individuals. But with sufficient
power, they can cause the internal organs to resonate,
producing death. They can cause sensitive materiel
subsystems such as electronics to overheat and melt.
Modern vehicle ignition systems, fire control electronics,
and communications networks are all vulnerable to this
type of attack. Ultralow frequency devices can be directional
and tunable, and can penetrate buildings and vehicles as
well, providing great potential for use in urban terrain.
Many of these weapons are already under development, and
the challenges of power requirements are rapidly being
surmounted. For example, the Russians have already
developed a 10 hertz sonic baseball-size device that can be
tuned for lethal or nonlethal effects9. The U.S. Army is
developing systems as well and has been working on a
tunable crew served acoustic weapon.10
Nonlethal weapons are a response to the changing
requirements and nature of conflict around the globe.
Peacekeeping missions and humanitarian assistance are
now frequent occurrences, and combat is more likely to
occur in an urban setting where the presence of innocent
8
civilians is likely to demand a reduction in collateral
damage. Insurgencies pose another demand for nonlethal
technology. The guerrilla’s traditional technique of inciting
the government to use overwhelming force, thereby
alienating the population, is now at risk. In the future
terrorists will find it much more difficult to hide behind
human shields, and radical or fanatic groups may be
deprived of their much sought after martyrdom, all because
of our use of nonlethal weapons.
Current nonlethal developments are targeted at
performing a wide range of tasks in a civilian intensive
environment where damage must be limited. In built-up
areas, buildings and rooms may be seized with minimal
damage through the employment of sedative agents or
electric, acoustic, or pyrotechnic stun weapons. Crowds may
be controlled through the use of blunt impact or malodorous
munitions. Individuals may be marked with invisible
marking rounds fired (along with many of the other
mentioned devices) from the Objective Individual Combat
Weapon (OICW) 20mm grenade launcher. Individuals may
be secured for apprehension by entanglements or sticky
foams and effective barriers created with nonlethal
acoustics. Various devices may be employed for seizing or
controlling vehicle access as well. Engine kill acoustical or
directed energy devices or aerosols as well as antitraction
materials can create barriers or assist in the apprehension
of those attempting to flee.11
First deployed to Somalia to assist in the withdrawal of
U.S. forces, where limited use was made of sticky foam,
nonlethals have since been deployed to Haiti and Bosnia,
and can be expected to remain on the scene for the
foreseeable future. For the first time, the ground
commander has the option of a graduated response across
the spectrum from lethal to nonlethal, depending on the
situation. This is not without some complicating factors; for
example, rules of engagement are likely to become more
complex. Finally, nonlethal technology could lower the
psychological threshold of war, making it a more palatable
9
instrument of policy. A palpable threat of death has utility.
Regardless of potential shortcomings and complications,
nonlethal weapons provide infantry a flexibility of response
previously missing from the inventory.12
Mortars.
A dispersed battlefield may in some cases limit field
artillery’s efficiency in attacking certain targets, which may
have a high priority for engaged units. While this represents
no change from current requirements, the infantry’s
traditional weapon to fill the gap, the mortar, is undergoing
a quiet revolution. With a range of 7,200 meters (vice the
5,700 meter range of the Russian equivalent), the 120 mm
mortar currently being fielded, along with future composite
mortars which can be fired from a HMMWV, will provide
the American infantryman a significant advantage.13
More important than the mortars are the associated fire
control capabilities and ammunition. Scheduled for fielding
in 2001, the XM95 Mortar Fire Control System (MFCS)
completely integrates the mortar platoon into the Advanced
Field Artillery Tactical Data System (AFATDS). For the
first time, mortars will be digitally linked to the fire support
planning system. Essentially a conversion of the Multiple
Launch Rocket System (MLRS) positioning and guidance
system, MFCS reduces mortar setup times from eight
minutes to one. The crew does not have to dismount to lay in
the mortar due to imbedded Global Positioning System
(GPS), which also reduces the Circle Error Probable (CEP)
from 230 meters to 60 meters. Overall, the system provides
an autonomous single weapon system capability
functionally equivalent to Paladin.14
Enhanced fire control married with precision guided
mortar mu n itions ( PGM M) r ep r es ents a d ead l y
combination. Employing an infrared sensor, the PGMM
operates in a man-in-the-loop mode for laser target
designation or in an autonomous mode where it
automatically seeks the largest infrared source in a 500
10
square meter area (expandable to 1000 meters). With a
range of 15 kilometers, the round is capable of precision
engagement of armor, bunkers, or other high value
targets.15
Infantry Fighting Vehicles.
Infantry forces traditionally exploit any mobility
advantage they can obtain. This has remained true from
mounted archers to 18th century dragoons, and extends to
the present day armored infantry fighting vehicle. Today
the American infantryman has available to him the finest
infantry fighting vehicle in the world, the Bradley.
Scheduled for fielding in the year 2000, the next version of
the Bradley, the M2A3, will feature second generation FLIR
and squad vision displays; will be completely digitized; and
will be capable of internetting with the other members of the
combined arms team. With enhanced situational
awareness, battlefield combat identification capability, and
better armor, the M2A3 represents an extremely survivable
and effective vehicle.16
However, by 2010 the initial production Bradleys will be
almost 28 years old. Given the rapidly accelerating
technological advances, continued upgrading may not be
cost effective. A new vehicle designed to meet the 2010-2015
threat and capable of autonomous dispersed battlefield
operations is required. To meet this need, the United States
Army Infantry School has developed the requirements
document for the Future Infantry Vehicle (FIV).
Designed for greater mobility, the FIV will weigh no
more than 25 tons, be transportable by C-130 or airdropped
from the C-17 or C-5. Capable of high dash speeds and rapid
acceleration, the vehicle would employ advanced propulsion
systems (possibly an electric drive) and be fuel efficient
relative to current systems. The vehicle will be designed to
automatically provide digital fuel and ammunition status to
logisticians, thus eliminating voluminous reports,
enhancing anticipatory logistics, and increasing optempo.
11
Addressing a critical mobility shortfall in the current
Bradley, the FIV will be amphibious capable with 5 minutes
preparation. Some unique capabilities such as an autopilot
and formation capability are being examined, along with
robotic control by the dismounted squad.17
Although considerably lighter than the Bradley, the FIV
will be more survivable. Anticipated as a turretless design,
the system will employ composite armor, saving weight,
and, through low observable technology, provide a
significantly reduced visual, radar, acoustic, and infrared
signature. Current design criteria specify 30mm or better
frontal protection and defense against top attack munitions,
employing false target generation/jamming or conceivably
the Phalanx shotgun type close defense weapon. Stand off
mine detection and destruction technologies are to be
incorporated, providing the vehicle an in-stride breach
capability. For the first time an environmental control and
overpressure system designed to protect the infantry
soldiers from chemical attack will be incorporated as well.
For offensive employment the FIV will feature a new
on-board multispectral smoke system designed to defeat
thermal sights. Like the Bradley, add-on armor will be
available.18
The FIV concept represents a significant increase in
flexibility by employing both lethal and nonlethal weapons.
With acquisition and weapon ranges out to 8000 meters, the
system will probably employ a lethal gun (perhaps
electromagnetic), fire and forget missile, and laser mix. The
system must defeat troops in the open or in trenches
(implying microfuzed munitions), destroy threat tanks
beyond main gun range while the FIV is in total defilade or
moving, and be capable of defeating both rotary and fixed
wing aircraft. Advanced target acquisition will allow for
multiple simultaneous tracking and precision engagement
similar to that of LOSAT. Nonlethal systems are employed
for close in self defense, especially in OOTW situations.
Finally, the FIV capability to carry an entire Land Warrior
squad of 9-12 soldiers represents the greatest increase in
12
lethality over the Bradley, which severely restricts squad
size.19
Employing a wide variety of integrated electronic
sensors, the digitized system will identify threats beyond
maximum engagement range and provide warning of threat
optical, laser, and radar acquisition and thermal indication
of munitions launch, direction, and velocity. The FIV must
be capable of employing unmanned aerial and ground
sensors, NBC alarms, jammers, and perhaps weapons.
Built-in test and training systems, including the ability to
download digital mapping and imagery directly from space
based or aviation platforms, complete a wide range of digital
capabilities. Digitization, however, will not be limited to the
vehicle alone.20
The Digitized Soldier.
As a result of current research and development
programs, the lethality, survivability, and sensor potential
of the infantry soldier is increasing rapidly (see Chapter 2,
Ms. Jezior’s study).
IMPLICATIONS FOR THE FUTURE
Force Structure.
The development of force structure to meet competing
requirements must exploit the inherent capabilities of
infantry to create a robust and flexible armed force capable
of executing its assigned mission at minimal cost.
The generally lightweight nature of much dual use
technology is applicable to the infantry soldier in particular.
This allows infantry to be rapidly and constantly
modernized at relatively low cost. Other systems are more
costly due to special production requirements. Large, low
density, high dollar systems with long production lead times
are even less cost effective. Light ground combat units offer
a greater return for the modernization investment. This is
13
not to say that other forces are unnecessary. They are
valuable, but they are less easily modernized and less
flexible across the spectrum of conflict.
Organizational Requirements.
Historically, revolutions in military affairs have
coincided with multiple transformations in mobility,
lethality, and information capability. These, combined with
timely adaptation of tactical or operational systems, result
in greatly enhanced capability to dominate time and space.
The most dramatic example of this is probably the
blitzkrieg, combining the mobility of the tank, the ability to
transmit information via vehicle mounted radio, and the
concept of close air support into an operational system
designed to disrupt rather than attack enemy defenses
directly. Achieving such a dramatic transformation today,
given the accelerated pace of technological change, poses a
great challenge. Strategic, operational, and tactical victory
will belong to the side that can develop organizations with a
superior combination of mobility, firepower, and
information capability at each level.
The Decentralization of Arms. Today we are witness to a
merging of the levels of war from tactical to strategic. Levels
of intensity are merging as well, and, as they do, many roles
and missions are changing and being consolidated. Aviation
is assuming the traditional role of cavalry based on its
mobility and information gathering capability. Artillery is
rapidly developing the ability to fix through precision
munitions and, along with aviation, is rapidly becoming the
biggest tank killer on the battlefield. Armor, no longer in
sole possession of a mobility advantage, now seems better
adapted for the role of a fixing force rather than
exploitation. The infantry has become one of the best
disrupters on the battlefield, a traditional artillery role. By
virtue of its unique capability to combine foot mobility with
that of the armored vehicle and aircraft, it remains the most
versatile of arms, capable of all its traditional roles as well.
14
These changes demand revisions to organizational
structure. Units capable of rapid concentration to attack
and speedy dispersal to avoid destruction are neither large
nor rigidly designed. The approach, then, is to combine
differential capabilities in the same unit at the lowest
possible echelon, as evident in the trend toward combined
arms and joint organization at lower echelons.
High optempo units will require organic mobility assets.
Units cannot wait for transportation on a dispersed
battlefield. Originally, armored personnel carriers were
fielded as a division or regimental asset, but later were
made organic to squads. It is conceivable that the assault
helicopter may one day follow this same path.
Dispersion, mobility, and vast improvements in
precision fire control and communications argue for a
decentralization of artillery as well. We have reached the
state where individual artillery vehicles can receive and
process a fire mission on the move, and execute it in 1
minute. This capability for dispersed yet responsive
artillery operations is unique to the U.S. Army and provides
the best possible defense against counterbattery fire.
In th e disper s i on of exp and ed battl es p ac e,
reconnaissance efforts are directly affected by a
g eometrically exp and i ng s ec ur i ty zone. Aer i al
reconnaissance is required at brigade level. Vehicular
mounted ground cavalry cannot cope with shifting
requirements of a nonlinear battlefield unless they are air
transportable. A combination of UAVs, rotary wing
aviation, and ground cavalry with vehicles which can be
slung under assault helicopters provides the most rational
response to this challenge.
The logic of dispersed operations argues for versatility
across the spectrum of conflict rather than the limited
specialization envisioned by some. Individuals may possess
a particular expertise, but units must be flexible, not
specialized. The balance of versatility and specialization
15
must be struck at the lowest possible echelon in order to
achieve flexibility.
Currently that level is the brigade as a fixed (though not
by Table of Organization and Equipment [TOE])
organization with multiple arms assigned in battalion
strength and supporting units attached for field operations.
Assigned combat arms units are subsequently task
organized at battalion task force and company team level.
The dispersed battlefield may force a lower level of
permanent assignment, retaining combat support and
combat service support units at brigade level and forming
more permanent task forces at lower echelons. This concept
has been promoted for some years by armor proponents
while the infantry community has steadfastly resisted it.
The time to reconsider may be here.
The Heavy Infantry Force. Heavy mechanized land
forces have lost the mobility differential they were created
to provide. The sheer bulk and weight of current combat
vehicles limits strategic, operational, and tactical mobility.
Light Infantry Forces. Designed for the low end of the
spectrum of conflict, today’s light forces are strategically
mobile and require minimum sustainment.
Current light forces will achieve substantial advances in
effectiveness through digitization. Situational awareness
has always been critical to light infantry. Lacking the
capability to extricate itself from danger through superior
mobility or to defend itself with massive firepower available
to heavier forces, light infantry commanders have excelled
at detailed planning and preparation for tactical operations.
The absolute requirement to get it right the first time or lose
a significant number of lives in the process has created a
culture of deliberate, methodical operations. Conversely,
this same cultural aspect has slowed the tempo of light force
operations to a crawl, even when merged with the powerful
mobility advantage of an air assault task force. Digitization
and greatly improved situational awareness should
increase the tempo of light operations considerably.
16
Lack of organic tactical, and to a lesser extent
operational, mobility will still restrict the scope of light force
operations. Maneuver by muscle quickly exhausts the light
infantry soldier. To overcome these shortfalls, tactical
mobility must be reintroduced to the light division structure
through the introduction of either ground or aviation lift
capability.
Air assault is the only organizational concept which
retains the full capability of light infantry while providing
the tactical and operational mobility required of the modern
battlefield. From Algeria and Vietnam to the Falklands and
DESERT STORM, the merger of infantry foot mobility and
the speed and obstacle crossing capability of the helicopter
have proven to be a potent combination. In close terrain the
attack helicopter served as a direct fire support weapon for
the infantry, while the infantry found enemy targets for
servicing by indirect fire support units. In open terrain the
infantry served to secure and support attack helicopter
operations.
Today’s aviation allocation to light divisions is
inadequate for the fast-paced operations of the future.
Battlefield agility must be enhanced if tomorrow’s force is to
truly achieve full spectrum dominance. Small highly mobile
organizations with exceptional long range nonjammable
communications and rapid cross country speed (both
operational and tactical) can dominate a wide variety of
tactical situations. Future force structures should provide
aviation at increasingly lower echelons, eventually
replacing the air assault concept with one of air maneuver.
The Infantry Squad. The squad will remain the building
block of infantry units. The traditional parameters that
have limited squad size are expanding. Previously,
dispersion of the squad was restricted by the range of voice
communications. Individual soldier radios and GPS along
with soldier computers, which can provide automatic
location updates, increase the command and control
capability of the squad leader, and the situation awareness
17
of his subordinates. Individual soldiers may find
themselves dispersed 50 to 150 meters or even more,
depending on terrain conditions.
With individual combat weapon ranges of 1000 meters,
squad level antiarmor capability with Javelin of 2000
meters, and the digitized ability to call and have precision
guided indirect fire on the way in 60 seconds out to a range of
7,200 meters, the squad can dominate the same terrain as
yesterday’s rifle platoon. Squad firepower is no longer
dependent simply on the number of riflemen.
These changes dictate the requirement for a new squad
study. The last study, the Infantry Rifle Unit Study (IRUS),
was conducted in 1969. Employing various combinations
from zero fire teams to three, and numbers of soldiers from
seven to sixteen, this study reached several important
conclusions. First, for ease of control two fire teams, each
with leaders, was the best organization for the infantry
squad. Second, each squad should have an organic machine
gun for additional firepower. Finally, squads of eleven and
thirteen men consistently outperformed smaller
organizations, especially in close terrain situations where
smaller organizations rapidly became ineffective due to
attrition and compartmentalization. These results
confirmed earlier testing in 1956 and 1961.21
The rationale for the current nine-man squad of the U.S.
Army leaves much to be desired. The 1946 Infantry
Conference at Fort Benning, Georgia, provides the only
semblance of justification for this organization. This
conference examined, among other issues, possible
revisions of the World War II 12-man rifle squad. Attendees
operated on two key assumptions. First, the squad should
consist of only as many soldiers as a single leader could
control; and, second, it would not engage in separate fire and
maneuver as mutually supporting teams, but operate as a
single unit within the context of platoon fire and
maneuver.22
18
Conference members determined that the number of
soldiers to execute this concept was about eight plus the
squad leader. Additionally, based on wartime experience, it
was concluded that the squad should be capable of
absorbing 25 percent casualties and still remain functional.
Subsequent studies of wartime operations have determined
that separate team employment in supporting fire and
maneuver is impossible once squad size drops to seven men.
Hence a nine-man organization has little hope of executing
current squad level fire and maneuver doctrine.23
The ultimate adoption of the current nine-man squad
has no basis in warfighting theory. When the Army decided
to adopt the Army of Excellence and create new light
divisions, it came up short in personnel strength. This
shortfall was made up in part by the reduction of
nonmechanized squads from eleven to nine men. Similarly,
the mechanized infantry squad was constrained based on
the carrying capacity of the Bradley vehicle, not infantry
combat requirements. Given peacetime manning and
wartime attrition, effective training and combat operations
appear to be at risk with this organization, especially when
the need for dispersion is considered.24
Intuitively, it seems that the infantry squad needs to
increase in size, given technological advances and the
nature of the future battlefield. However, such a decision
needs to be made on the basis of scientific analysis, not
opinion.
Leadership.
New organizations and tactics will require even better
leadership at lower echelons. Dispersed and independent
operations of small units will require the caliber of
leadership and reliability normally expected of the officer
corps. This will further enhance the already strong role and
prestige of the noncommisioned officer (NCO) in the
American Army. However, increased technical aspects of
military operations will make it more difficult than ever to
19
retain quality noncommisioned officers, especially in an era
of a strong economy. This will demand an increase of
benefits commensurate with enhanced responsibilities.
Soldiers are affected by leadership, machines are not.
Even today there exists a disparity between grade and pay
versus leadership requirements and responsibility. In a
military institution where all specialties are technical, a
more b a lan ced ap p r oac h between benef i ts and
responsibility is necessary. The current rifle squad costs the
government as much as a high performance aircraft over an
equivalent life cycle and requires much more skill to lead
under the turbulence of peacetime conditions, not to
mention the stress of close combat.
The tradition of an officer requirement as pilot for a
single aircraft as compared with a senior noncommisioned
officer to command a single combat vehicle must be
reexamined. An actual comparison of risk, responsibility,
and pay would be embarrassing to the officer, especially
considering that information technology and robotics are
rapidly eroding the requirement for manned aerial
platforms. Traditional approaches based on elitism are no
longer relevant.
Because of increased span of control, the future
noncommisioned officer corps could be smaller, allowing
more flexibility for better pay and enhanced privileges and
benefits. The gap in rewards between those who lead people
and those who only control machines must be closed,
especially if both must possess considerable technical
competence as well.
While the NCOs will become the specialists, the officer
corps will require more generalists capable of commanding
combined arms units. This represents a refutation of many
futuristic visions of increased specialization. With
increased skill expected in the employment of all arms at a
lower grade, merger of branches may be necessary at field
grade into a maneuver specialty rather than the current
combat arms system. Retention of skill identifiers would
20
assist in providing the proper mix of experience in combined
arms battalions by alternating specialties in the command
group. This simply represents tacit acknowledgment at a
lower echelon of what occurs today in heavy brigades, where
the second in command is from a different branch than that
of the brigade commander.
The increased span of control derived from better
situational awareness raises several associated issues.
With increased span of control at each echelon and fewer
echelons in the hierarchy, the leader-to-follower ratio is
obviously diminished. This creates a flatter pyramid for
upward mobility in both the officer and NCO corps,
introducing the associated issues of opportunity for
promotion and increased pay. This may require shorter
careers and a revision of the military retirement system.
At the same time, a short career must be made attractive
through enhanced pay and benefits such as education,
retraining, and separation options. Another option could be
an expansion of officer candidate opportunities in lieu of
other commissioning programs. One of the traditional
reasons for maintaining a separate officer and NCO
structure has been the time required to advance through the
ranks. With fewer echelons and an increasingly higher
standard for NCOs, a merger of the leadership structure is
conceivable, though highly controversial.
A final issue concerns the development of daring and
resourceful leaders. Dispersion and greater span of control
have the potential to result in reduced personal contact with
soldiers. It becomes more difficult and less necessary to
“troop the line” for an actual look at the situation. One of the
principal dangers of overreliance on information technology
is that it has the potential to distance the chain of command
from the fighting soldier, whose respect for leaders is based
not only on their competence, but their willingness to share
the hardship of the battlefield.
21
The Infantry Soldier.
The word “warrior” is the most frequently abused label
in the current military lexicon. Most, if not all, who wear a
uniform view themselves as warriors. In reality there are
very few who qualify.
A warrior is one who places himself at great risk to
engage in direct combat with the enemy. Generally
speaking, where the casualties may be found, there also will
the warriors be found. This criterion eliminates a
significant majority of the nation’s military structure and,
indeed, large parts of the Army. It is not difficult to argue
that, as a group, the infantryman represents the most
numerous warrior element in the armed forces. Always at
the greatest personal risk and with the least protection, he
offers battle to his enemies on an individual, personal, and
sustained basis.
Even within this group, the warrior ethic is not allinclusive. S. L. A. Marshall was one of the first American
military writers to recognize that relatively few
infantrymen actually fired their weapon in battle. By his
research, only 15-30 percent of World War II combat
infantry soldiers actually fired their weapon in an
engagement. This contention was verified in postwar
articles by infantry unit commanders who stated that in any
given engagement, you could count on certain soldiers to
aggressively engage the enemy. Others, who were willing to
share the danger, did not necessarily fight. Asked to repeat
his study in Korea, Marshall found the average up to 50
percent.25
Although Marshall’s findings have been hotly debated
for years, numerous other scientific studies of the Korean
War determined that there were certain characteristics of
fighters and nonfighters, which could be easily identified in
advance. Significant among the factors required of the
fighter were a higher order of intelligence, combined with
leadership ability, outdoor orientation, emotional stability,
and a sense of humor. All factors were clearly identifiable
22
through personality tests, which could be administered
prior to selection for a military specialty.26
This research has significant implications for the future
infantry force. The high-tech land warrior of the future
requires a greater degree of resilience than his
predecessors. Stress on highly mobile units is likely to be
increased due to their more frequent employment in
combat. With increased dispersion, the requirement for
self-imposed discipline becomes higher, and a greater
premium will be placed on self-reliance, initiative, and the
ability to operate for extended periods alone or in small
groups. All soldiers on the future battlefield must be
predisposed to fire their weapon.
This argues for psychologically and physically stronger
infantry soldiers possessing the best physical, mental, and
moral traits the nation can offer. Infantry soldiers cannot be
drawn from lower quality recruits. To achieve the goal of
“every man a fighter” requires psychological screening and
conditioning. This same method is applied today to the
selection of special operations personnel, who must
consistently operate in an environment similar to the future
dispersed battlefield.
Two other criteria must eventually be applied in
selecting the individual infantry soldier. First, there must
be age limits for enlistment into an infantry specialty.
Infantry is a young man’s game. With age comes loss of the
physical ability required to operate at platoon level. Second,
from the standpoint of maximizing military effectiveness,
the individual combat soldier should be single. There are a
host of reasons for this. The higher operational tempo of a
smaller force structure could be better managed with less
soldier stress and therefore better focus during extended
training or deployments. Psychological tests of fighters and
nonfighters from the Korean War show a direct correlation
b etween n on fig hter s and c ombat sol d i er s wi th
dependents.27 This is not a politically correct observation,
but it is true. Soldiers with conflicting loyalties between
23
commitment to the squad and responsibility for providing
for dependents are less likely to expose themselves.
In a small military, those who endure the harshest
service should be offered the most compensation. A gratis
educational scholarship program combined with thorough
screening would have the advantage of attracting more of
the desired candidates for infantry as well as providing
sufficient motivation to leave the service short of traditional
retirement. Interestingly enough, the best trained and
disciplined light infantry represented by the Ranger
Regiment already experience this as a natural process. Most
Ranger first termers leave the service for college, having
saved the required amount of matching funds to complete a
degree.
The only nonlinear wars that we have fought in the past
have been counterinsurgencies. These conflicts have always
been infantry intensive. The requirement for infantry on
the dispersed nonlinear battlefield of the future will be no
less. In fact, demands for infantry protection of combat
support and combat service support units during division
level warfighter exercises always exceed capability. The
increasing probability of urban operations magnifies this
requirement for more infantry.
If infantry is the most employed and most capable of
arms, it also the most frequently expended. Casualty
statistics for infantry have remained relatively constant.
While overall casualties have been reduced significantly,
those from the infantry have remained around 80 percent of
the total.28 While dispersion, new tactics, and better
individual body armor and stealth technology may reduce
these figures, we can still expect the infantry force to
sustain the bulk of casualties in future war. In fact, casualty
losses by branch provide a clear indication of the depth
required to sustain lengthy combat operations. By some
calculations, there is insufficient infantry strength today,
active and reserve, to repeat a successful defense of South
Korea.29
24
Infantry shortages in close terrain combat have
historically led to cannibalization of other units to provide
the required ground strength. This occurred in World Wars
I and II and in Korea. Operations in Somalia, Haiti, and
Bosnia have highlighted the substantial shortages of
infantry strength in heavy units deployed to these regions;
nondeploying units were stripped of infantry to fill positions
in participating organizations. This is not surprising as the
current mechanized infantry platoon has only two
nine-man squads, representing two-thirds of its light
component and only one-half of previous wartime
organizations. Similar shortfalls in forces of the former
Soviet Union in Afghanistan and Chechnya dramatically
highlight the risks of infantry-poor units in combat.
This problem will be magnified on the future battlefield.
Mobile units are more frequently engaged, resulting in
more casualties over time. Although their casualties per
engagement may be fewer based on their ability to choose
and strike the enemy’s weak spots, the cumulative effect
may be greater. At the same time, the human “machine”
requires time to recover from the stress of combat. A medical
analysis of infantry units in Korea under various combat
conditions from light to heavy provided a clear indication of
the time required to regain full human combat potential.
The more intense the combat, the longer the recovery time
required.30
This finding implies serious consequences for
attempting to do more with less in infantry close combat. No
other arm bears the psychological and physical burden of
the infantry soldier. Men are not machines, and they must
be sustained differently or they will eventually fail. Aside
from reduced combat effectiveness, the results of repeated
commitment to combat without recovery time include a
greater propensity to commit atrocities, a serious political
consideration given the global information environment of
future war.
25
Current Army infantry strength represents only 11.4
percent of the active component and 10.4 percent of the
reserves.31 This is an amazing situation, given the wartime
and OOTW requirements for infantry. In a long war or two
ma j or reg ion a l conti ngenc i es , es p ec i al l y wher e
reconstitution of units is mandated, this manning practice
will create significant problems. The increase in required
technological competence degrades the ability to mass
produce combat infantry soldiers. A larger infantry
component is required to meet the challenges of future
conflicts. This does not entail an increase in force structure.
Manpower savings in crew reductions due to automation
and a reduction in clerical and enlisted staff requirements
must be reinvested in infantry strength.
Training.
Training represents the single greatest challenge to the
future infantry force. The infantry soldier must be trained
to operate in small groups or as individuals for extended
periods. While initial quality selection will help, the new
recruit must be conditioned for the additional stress of new
forms of combat. This requires a more demanding basic and
advanced individual training program than is currently
employed. The internalization of soldier values must
become a goal of training as well. Only the crucible of a
combined selection and conditioning process can provide the
product required for decentralized operations.
Overall, essential technical training for the digitized
soldier will require a longer training program than that
currently employed. As a result of dispersion, the individual
soldier may be required to obtain additional skills such as
conducting indirect fire and performing selected engineer
tasks. Close combat skills cannot be neglected and must
remain the core of individual training. In addition, the
training base must turn out a fully as opposed to a partially
trained soldier. Units will have their hands full responding
to sustainment training for an increased number of tasks
and adapting training programs to rapid changes in
26
doctrine, tactics, techniques, and procedures. They will not
have the time to complete the soldier’s individual training.
Accelerated technological change will outdate many
techniques and procedures within a relatively short time.
Lack of a monolithic enemy with a set doctrine, as in the
Cold War, complicates matters as well. While doctrine and
tactics can be developed within 1-2 years to keep up with
these changes, internalization of new doctrine is much more
difficult. Incremental modernization of the force will create
its own challenges. Requirements for top-to-bottom
retraining of units in the field will demand innovative
solutions. Distance learning provides one alternative for
rapidly disseminating new doctrine. This will require
changes to institutional structure and some adaptations of
the battle focused training approach.
One way to increase quality and decrease training time
is to standardize squad and dismounted platoon doctrine
and standard operating procedures across the force and to
focus on basics. While infantry forces possess a common
mission with associated tasks required for successful
employment, they may be deployed strategically,
operationally, or tactically by a variety of means. Care must
be taken to distinguish between means of delivery, which
can vary, and means of employment, which can be
standardized.
A false theory of specialization by means of delivery
undermines the essential character of infantry, which is
defined by its role on the battlefield. The impact of this
myopic concept is a general dilution of emphasis on basic
infantry tasks and increased emphasis on tasks associated
with getting to the place of employment. In a training
resource constrained environment, this specialization
concept is dysfunctional, siphoning away time and
resources from the main effort, teaching infantry combat
doctrine.
Contemporary unit experiments have benefited from
Army level training and doctrine development resources
27
applied to individual units of brigade size or lower. While
these experiments shed little light on how to structure the
modernizing institutional army, they can provide some
valuable insights to the changing battlefield and the
expanding role of infantry.
Recent Experimentation Results.
Recent simulation results culminating in the Force XXI
Army Warfighting Experiment (AWE) at the National
Training Center confirm the potential of infantry as the
dominant future battle force. Lethality of the dismounted
infantryman has been demonstrated to be dramatically
increased through improvements in weaponry and night
vision equipment. For example, Dismounted Battlespace
Battle Lab (DBBL) experiments, including Warrior Focus
and Night Eagle, used various night vision enhancements
with impressive results. In one M16 qualification firing
experiment employing night vision goggles with laser
aiming lights, total hits were almost the same for night as
for daylight. Standing position hits were even better at
night.32 During the Warrior Focus exercise at the Joint
Readiness Training Center, experimental units equipped
with upgraded night vision equipment scored more hits on
nighttime live fire exercises than the previous ten rotational
units and suffered far fewer casualties.33
Recent Force XXI AWE results provide indications of a
similar lethality increase against armor. The Javelin
antiarmor missile, currently replacing the M-47 Dragon,
devastated any operating force (OPFOR) that dared come
within range. Unlike many of the other AWE initiatives,
light infantry employment of this weapon was considered by
all observers an absolute success. Innovative tactics such as
ferrying light antiarmor teams around the battlefield in
UH-60 Blackhawk helicopters to block OPFOR movement
provide a clear indication of the future capabilities of
infantry married to aviation.34
28
This same combined infantry/aviation capability and its
enormous battlefield impact was employed in the Prairie
Warrior 96 AWE at Fort Leavenworth, Kansas. This
experiment provided for a “Mobile Strike Force” concept of
digitized units. Two brigades of the force were standard
mechanized and armored heavy units equipped with the
best computerized command and control systems under
development, along with direct feeds of intelligence
collection assets into the brigade tactical operation centers.
The third brigade was a light motorized infantry unit with
an armored gun system battalion and a variety of new
weapons, including 120mm mortar precision guided
munitions and HMMWV mounted EFOGM and LOSAT.
This light brigade was not resourced with the same level
of intelligence and communications support provided the
heavy brigades. Task organized with the aviation brigade
for additional mobility, this unit destroyed more enemy
than either of the other two organizations and suffered
considerably fewer casualties. Imaginative tactics
employed the aviation for operational and tactical mobility,
the HMMWV for tactical mobility and rapid closure to
targets from landing zones outside enemy low level air
defense coverage, and the infantry to find and fix the enemy
forces for precision attack.35
Similar division level experiments by the TRADOC
Analysis Center (TRAC) showed comparable results.
Regardless of division design employed, the greatest killers
in the open terrain fight were consistently attack aviation,
precision rocket artillery with brilliant antitank munitions,
and infantry. Tank engagements were minimal in their
contribution (less than 10 percent of enemy combat vehicle
kills) due to limited mobility compared to other assets.36
Aside from employment in combat, infantry proved its
utility as a security force in the seizure of terrain required to
facilitate helicopter and artillery mobility, and as an aid to
disrupting and targeting enemy forces.
29
The DBBL is currently focused on an advanced concepts
technology demonstration labeled the Rapid Force
Projection Initiative (RFPI). The RFPI hypothesis proposes
that hunters employing advanced sensor technology and
digitally linked to precision stand-off killers such as
EFOGM, High Mobility Artillery Rocket System
(HIMARS), and automated howitzers firing Sense and
Destroy Armor (SADARM) munitions can tremendously
increase rapid deployment force survivability and lethality.
Experimentation is far from complete; however, initial
computer simulations have shown a clear increase in
effectiveness. In one scenario, an airborne brigade using
conventional tactics and weapons was defeated by an
attacking motorized rifle regiment. When the same scenario
was run with the airborne brigade using the RFPI concept
and equipment, the threat regiment was defeated before it
ever came close to the airhead.37
Army After Next wargames have taken mobility and
strategic deployability requirements to a new level. Since
future combat units must be more deployable while still
maintaining lethality, this experiment employed several
lightweight brigade sized organizations with organic
strategic/self-deployment capability in a scenario involving
multiple major regional contingencies. The principal
success of this approach was the demonstrated ability to
rapidly execute deployment to multiple regional
contingencies in different theaters. Execution of the concept
was made feasible only by a dramatic reduction of present
day requirements for ammunition and fuel and through
close association of ground units with their strategic lift.38
When considered together with other results, AAN
experimentation clearly points to the future contribution of
infantry within the context of national military strategy,
operational art, and tactical doctrine.
The Future Contribution of Infantry.
The ground force mission is to take the struggle to the
heart of the conflict, where it directly affects the opponent’s
30
will. By seizing the critical points necessary to bring a
struggle to its conclusion, ground forces create a permanent
presence that cannot be ignored. Air power alone is
incapable of this decisive act except as a means of delivery
and support for airborne/mobile troops. Neither is naval
power able to execute decisive operations on its own, except
in a limited way and only then through the introduction of a
ground force such as naval infantry.
In operations across the spectrum of conflict, the close
combat soldier is the final arbiter of victory or defeat.
Technological advancements are rapidly increasing the
capabilities differential between the infantry soldier and
his potential opponents to the point of returning infantry
dominance to the battlefield.
The first phase of change has already begun. Fielding of
expanded night vision capability to every soldier is
scheduled to begin this year. This fielding includes thermal
sights for individual weapons that can see through smoke
and fog for the first time. This one change will dramatically
tilt the balance of infantry combat power in favor of the
American soldier. The second major change is occurring
relative to the infantryman and his open battlefield
nemesis, the tank. As the latest National Training Center
rotation clearly showed, infantry equipped with Javelin are
deadly to armored forces. These new capabilities will begin
the change to a tactical doctrine that provides for a wider
variety of infantry employment in a more expanded
battlespace.
The second phase of change will accompany the rise of
the Longbow equipped helicopter as the premier tank killer
of the future. Full fielding, beginning in 1998, will further
increase helicopter survivability, denying direct fire
counterengagement. The effect will be similar to the
artillery revolution brought on by combining ballistics with
the field telephone. Possessing superior mobility and
firepower, and with the capability of terrain protection en
lieu of armor, the attack helicopter will dominate open
31
terrain battle. At this point the artillery-infantry-aviation
combined arms team begins to emerge more clearly as the
heir to mobile warfare. This evolution will accelerate with
further artillery and infantry developments.
By the year 2000, automated artillery and mortar fire
control will be digitally linked to the individual soldier via
the Land Warrior system, initiating the third phase (see
Chapter 2). This coincides with the fielding of the rapidly
deployable and highly mobile HIMARS rocket system
capable of firing the Army Tactical Missle System
(ATACMS) with brilliant antitank submunitions out to a
300 kilometer range.39 To cover this geometrically expanded
battlefield with 24-hour all-weather surveillance will
require a dedicated infantry-aviation team employing
lightweight vehicles that can be lifted into position. By this
time, the requirements of an expanded battlespace will
relegate units still having large logistical requirements to
the status of third world armies.
The final phase of foreseeable change will coincide with
the obsolescence of the current family of systems beginning
about 2005. By this time, the Army has planned to begin
fielding of its first robotic systems,40 and Future Infantry
Vehicle development should be nearing completion,
providing enhanced mobility, lethality, and protection for
the infantry soldier. Infantry cross spectrum dominance in a
variety of environments will be improved by the
introduction of planned individual and crew served
weapons in 2006. The rapidly deploying ground soldier’s
ability to destroy armor will have reached a new level with
the introduction of LOSAT and EFOGM systems mounted
on light vehicles.
Artillery systems will complete the evolution required to
rapidly destroy massed armor with the fielding of the BAT
P3I brilliant antitank munition in 2005 along with fully
automated artillery represented by the Crusader. These
developments coincide with the fielding in 2006 of
Commanche, which, when combined with lightweight
32
infantry and artillery systems, will have transformed the
combined arms team into an agile, dynamic, and lethally
deployable force capable of true cross spectrum dominance.41
CONCLUSION
Smaller forces need not be less lethal. A carefully crafted
force incorporating new weapons capabilities and
information technologies can be more deployable, more
lethal, and more versatile than existing structures. This
will require innovation in design, and perhaps significant
changes in tactics and doctrine as well. Requirements for
dispersion on the open battlefield will demand increases in
mobility for all forces. At the same time, the more likely
close terrain fight will demand an increase in high quality
infantry offset by decreases in crew and clerical
requirements allowed by automation.
Traditional roles and relationships may be dramatically
altered as capabilities brought on by technological change
are incorporated into the force. Regardless of change, basic
principles of force design will drive us toward a balanced
combined arms team structure where the capabilities and
limitations of all arms, old and new, are mixed in a balanced
fashion to minimize weaknesses and maximize the threat to
our enemies. This union of capabilities, all strategically
mobile from the continental United States and rapidly
redeployable from one theater to another, meets the
requirements of Joint Vision 2010 and will set the stage for
transition to the Army After Next.
ENDNOTES - CHAPTER 1
1. Commandant, United States Army Infantry School briefing,
“State of the Infantry,” May 1996.
2. Ibid.
3. Ibid.
33
4. Ibid.
5. Ronald V. Hite and Gilbert F. Decker, Weapon Systems, United
States Army 1997, Washington, DC: U.S. Government Printing Office,
1997, p. 240.
6. Commandant, USAIS.
7. Ibid.
8. Directorate of Combat Developments, Infantry Programs and
Projects, Fort Benning, GA: United States Army Infantry Center, 1996,
p. D-1.
9. Joseph W. Cook, David P. Fiely, and Maura T. McGowen,
“Nonlethal Weapons: Technologies, Legalities, and Potential Policies,”
Air Chronicles, Maxwell Air Force Base, AL: Air University, 1996, p. 9
(http://www.cdsar.af.mil/mcgowen.html, June 5, 1996).
10. Gerald J. Iafrate, Advanced Concepts and Technology II,
Alexandria, VA: U.S. Army Research Office, 1995, p. 9.
11. Dismounted Battlespace Battle Lab (DBBL), Army Nonlethal
Requirements Briefing, June 10, 1996.
12. Cook, et al., p. 11.
13. Directorate of Combat Developments, p. C-2.
14. Ibid., C-5.
15. Commandant, USAIS.
16. Directorate of Combat Developments, p. E-2.
17. Directorate of Combat Developments, Mission Need Statement
for Future Infantry Vehicle (FIV), November 30, 1995, p. 8.
18. Ibid., p. 2.
19. Ibid., p. 4-7.
20. Ibid., p. 8.
21. Stephen E. Hughes, “The Evolution of the U.S. Army Infantry
Squad: Where Do We Go From Here? Determining the Optimum
Infantry Squad Organization for the Future,” Thesis, Fort
34
Leavenworth, KS: U.S. Army Command and General Staff College,
School of Advanced Military Studies, 1994, p. 18.
22. Ibid., p. 6.
23. Ibid., p. 14.
24. Ibid., p. 21.
25. Peter Watson, War on the Mind, The Military Uses and Abuses of
Psychology, New York: Basic Books, 1978, p. 45.
26. Robert L. Egbert, Victor B. Cline, and Tor Meeland, The
Characteristics of Fighters and Non-Fighters, Fort Ord, CA: Army Field
Forces Human Research Unit No. 2, 1954, p. 9.
27. Watson, p. 49.
28. Department of the Army, Staff Officer’s Field Manual
Organizational, Technical, and Logistical Planning Factors, Volume 2,
Field Manual 101-10-1/2, Washington, DC: U.S. Department of the
Army, October 7, 1987, pp. 4-11.
29. Mike Jacobson, “Whither the Infantry, Does the US Army Have
the Soldiers to Fight a Second Korean War?” Draft manuscript, Fort
Benning, GA, undated, pp. 18-19.
30. S. W. Davis and J. G. Taylor, Stress in Infantry Combat, Chevy
Chase, MD: The Johns Hopkins University Press, 1954, p. 3.
31. Office of Infantry Proponency, United States Army Infantry
School briefing, “Infantry Update,” May 1996.
32. Commandant, USAIS.
33. Dismounted Battlespace Battle Lab briefing, “Warrior Focus
Advanced Warfighting Experiment,” November 1995.
34. Sean D. Naylor, “The Javelin Missile: A Lethal Ace Up the
Sleeve,” Army Times, April 28, 1997, p. 14.
35. Personal observations of author acting as an Infantry School
observer.
36. TRADOC Analysis Command briefing, “Force XXI Division
Design Analysis,” March 1996.
35
37. Dismounted Battlespace Battle Lab briefing, “Rapid Force
Projection Initiative Concept,” April 1996.
38. Sean D. Naylor, “What the Future Holds . . .,” Army Times,
March 17, 1997, p. 20.
39. Hite and Decker, pp. 155, 161.
40. Directorate of Combat Developments, p. D-9.
41. Hite and Decker, pp. 109, 157.
36
CHAPTER 2
THE REVOLUTIONIZED WARFIGHTER
CIRCA 2025
Barbara A. Jezior
[Editor’s Note: Ms. Jezior’s study extends that of Colonel
Wells, speculating on advanced soldier technologies in a
systematic way which has not been done before. Ms. Jezior’s
future scenario provides a backdrop for these technologies,
several of which are on the very edge of thinking. This study
attempts to look beyond the systems Colonel Wells
addresses, most of which are in existence today, whether
fielded or not. DVJ]
INTRODUCTION
A Plausible Scenario.
At t h e en d of the 20th c e ntur y the mi l i ta r y
decisionmakers made some very astute choices. They
realized a land force would still be needed in 2025, but also
knew the politics and budget realities of the day meant a
small force was all they could realistically plan for. They
reasoned that, if it had to be small, it had to be elite.
Simultaneously, the technological advances in command,
control, communications, computers, and intelligence (C4I)
of the time were forcing radical changes in warfighting
doctrine. This future force would be fighting a war of
maneuver, not attrition, and one of the critical elements in
dominating maneuver could be a revolutionized warfighter.
Since the warfighter would continue to be the common
denominator of the spectrum of conflict, they saw no risk in a
full-bore investment that would equip the warfighter with
every tool possible that could tip the battlefield balance in his
or her favor. That foresight 25 years ago resulted in today’s
37
revolutionized warfighter who is the sine qua non for
military success across the globe, and who has proven the
wisdom of the earlier investment many times over.
The 2025 warfighter bears little resemblance to that of
the late 20th century. He and his team members are
multi-skilled, smart, and more “in charge” than their
predecessors.1 Radically new technologies have also served
to make him and her the soul of stealth and prowess on the
battlefield.They have an arsenal of cutting edge technologies
to select from.
On e bat t lefiel d op ti on i s the e nc a p s ul a te d,
climate-controlled fighting suit with power enhancements,
sophisticated weapons and sensors, a communication and
guidance package, and active (chameleon-like) camouflage.
The power and strength component augment the
warfighter’s own body strength by supporting all body parts
associated with load carrying. The suit provides situational
awareness, operational information, and tactical guidance
along with small-unit medical, logistic, and intelligence
data.2
Another option is a lightweight battle dress uniform that
is flexible and body conforming. It improves performance by
concentrating vital body heat and blood flow within
muscular tissues. It, too, has the sensors and C4I capabilities
of the first suit described. The compression materials
incorporate biological and physical sensors that monitor
blood pressure, pulse, body temperature, penetration (from
projectiles), blood loss, and other vital signs. It provides
friend or foe identification. All the sensors are linked and
centralized as appropriate.3 The warfighter also has
cotton-weight ballistic protection and lightweight
chemical-biological (CB) gear comprised of a fabric that
breathes like regular clothing when no CB agents are
present.
He can also augment his human powers with skinpatch
pharmaceuticals tailored specifically for him as the need
38
arises. For example, he can control his fears, and
generate greater powers of concentration and physical
strength.
He has three-dimensional representation of the
battlefield on his arm- or head-mounted display. He can take
virtual trips to other parts of the battlefield to see the action
from other vantage points. He has extended sensory powers
that are continuing to evolve. Not only can he see everything
in human visual range, to include what is obscured by
terrain or structures, he will also be able to hear and see
beyond human range and see the enemy before the enemy sees
him. If by any chance the enemy should see and target him
first, he has the inner comfort of knowing that the sensors
embedded in his clothing would alert the medical world of
his exact whereabouts and the seriousness of his wounds.
He can connect to the entire information infrastructure
with a tiny system that has filtered incoming data to offset
information overload. He gets what he wants when he needs
it. His computer system is interactive and has both video and
voice functions. Best of all, it is so user friendly that no
training was required. It is completely integrated with his
other equipment.
The combination of his innate capabilities with radically
improved communications and situational awareness has
resulted in flattening the traditional military hierarchy. His
team is very small and flexible, its size and structure mission
dependent. Both his lateral and hierarchical relationships
are a source of support and strength.4 He has a level of
understanding that far surpasses his level of authority.
Every kind of information is his to receive, understand, and
assess.
His weapons are far more lethal and precise. These,
combined with the support of the precision indirect fires he
knows he can depend on, give him immediate target kill. The
indirect fires will be on time and on target; there is no more
mistaking friend for foe. Immediate target kill has terrific
39
psychological impacts—a positive one on him, and a
negative one on the enemy.
Back to 1997.
Whatever the future brings, many investigators believe
a small strategic land force will be a requirement. This force
must deploy swiftly, deter or halt aggression, and secure
any area vital to U.S. interests. Investigators also predict a
shift from large armies fighting attrition warfare to small
dispersed units fighting maneuver warfare.5
Technological advances in the C4 I arena and the
correlative changes in doctrine, training, and leadership
also point to that small, elite force comprised of
multi-functional soldiers or integrated combat arms
formations.6 Either case demands the multi-skilled, highly
mobile, and independent warfighter, linked to other
platforms, who may be fighting more often in cities and
suburbs than on open hills.7 This future warfighter will also
probably face the outlaw tactics of nonstate actors who have
no compunctions against using chemical/biological (CB)
weapons.
These future warfighters must achieve dominance in
maneuver to gain battlefield control and to increase their
probability of survival. Enjoying a technical revolution in
soldier capabilities, they will seek distributed and
cooperative engagement at the lowest levels.8 The small
elite force of the future simply must be as lethal and
high-powered as possible, down to the very last warfighter.
As the first Army After Next war game indicated, “The sine
qua non of ground forces in the future is smart, high-quality
soldiers who can operate at a very, very fast tempo and in a
very sophisticated way.”9
40
TECHNOLOGICAL STEPPING STONES
TO THE WARFIGHTER SYSTEM
What technologies are on the horizon that can meet the
materiel needs of such a revolutionized force? This paper
discusses a few of those technologies relevant to the
dismounted “Warfighter System,” those pertaining to any
item the dismounted warfighter wears, carries, and
consumes in a tactical environment. These technologies will
improve one or more of the warfighter’s lethality,
survivability, C4I, mobility, and sustainability.
Only recently has the Army decided to take a systems
approach to managing soldier programs, the same approach
it takes to managing major weapons systems. This means
the myriad of soldier programs now enjoy centralized
oversight as the “Warrior System,” rather than having each
commodity developed in a stovepiped, piecemeal fashion.
This allows for a fiscally balanced and prioritized soldier
“platform” that makes these programs more visible and
better able to compete for funding. It also means better and
better-integrated equipment.
Land Warrior Program.
A revolutionized warfighter will be the result of an
evolutionary process, since no one program will develop a
whole new set of technologies to replace all warfighter
components at once. The Land Warrior program managers
have taken a systems approach to developing technologies
that will result in dramatically new and improved
capabilities for the dismounted soldier. There is definitely
room for improvement, especially in those areas pertaining
to information technology.10
By the year 2000, we will begin to see Land Warrior
modular fighting systems designed for close combat
situations.11 The basic components are a helmet mounted
display, an improved image intensification (I2) modular
weapon, improved protective clothing to include improved
41
modular body armor, a computer and radio set-up, and
special software for battlefield communications.
The helmet-mounted computer display is linked directly
to the M16 or M4 weapon, which can incorporate other types
of weapons and sights. The weapon’s thermal sight allows
target engagement in daytime, nighttime, around corners,
or out of a foxhole without exposing its bearer. The
computer-based global positioning system (GPS) and radios
are mounted on the soldier’s back. Digital orders can be
transmitted down the chain of command, and, if a soldier
sees something worth reporting, he can also send a digital
report through his computer.
The thermal weapons sight, which can see through
obscurants like smoke, also makes it possible to transmit a
digital still video picture of a battlefield object. The system’s
modularity means the soldier can “mix and match” the
various components, depending on mission needs. This
ensemble is already in prototype and has been demonstrated.
The Land Warrior system will give battalion tactical
operations centers better control of the battlespace and the
pace of operations. Unit leaders will know where their
soldiers are and be able to meet their logistical needs very
quickly.
Military Operations in Urban Terrain (MOUT).
Urban warfare is predicted to be a large part of the
military future and is a tough challenge in many ways. It
usually involves high military and civilian casualties.
Today, the capabilities for conducting urban operations are
no different than they were in Vietnam, as fighting in the
Balkans is demonstrating. 12 Urban operations have
traditionally been characterized by difficult command and
control (C2), high military and civilian casualty rates, and
large numbers of soldiers.13
42
What urban fighting requires is light, mobile
combatants who are in tune with their immediate
environment (situational awareness), and who have links to
outside platforms, such as sensors and fires. They also need
flexible, responsive logistical support. While soldiers
fighting in the open have many similar requirements, urban
infrastructure and the constant risk of civilian involvement
impose unique conditions.14
There is a joint program underway which will meet
many of the requirements for urban fighting, constituting a
major intermediary step toward the revolutionized
warfighter(urban or otherwise). This MOUT Advanced
Concepts Technology Demonstration (ACTD) will
demonstrate new concepts in 2000, and the resulting
materiel should go into full scale development and fielding
within 3-5 years thereafter. The individual projects that
make up this umbrella program are:15
Force XXI Land Warrior. Adds sophistication to the
Land Warrior system previously discussed, such as further
advanced individual communications, situational
awareness, location, and small arms body armor.
Small Unit Operations. Communications/geo-location,
sensors, and situational awareness technologies will be
integrated in other battle platforms allowing enhanced C4I,
and sensor to shooter linkages with precise indirect
weapons.
•
•
Objective Individual Combat Weapons. Precision
individual weapon, employing either point munitions
or airbursting munitions for attacking targets in
defilade. Fire control will be wirelessly linked to C4I
networks for indirect viewing of targets (on a helmet
mounted display) and precise handover of targets to
indirect fire weapons systems.
Combat Identification. Knowing friend from foe will
be accomplished by embedded soldier-to-soldier laser
43
interrogation and radio frequency response enabled
by sensors and C4I.
•
•
•
Counter-sniper. The ability to detect sources of direct
fire.
Non-lethal weapons. Non-lethal technologies are
being pursued that will incapacitate, distract, or seize
individuals, stop vehicles, control crowds, deny areas,
and disarm or neutralize equipment.
Multi-purpose Individual Munition. A shoulder-fired
weapon that can defeat light armor and targets in
masonry structures.
With the successful outcome to this ACTD, the
warfighter will be able to move information around the
battlefield as needed. Everything from firepower to supplies
can be delivered when and where needed. A warfighter’s
probability of survival is also greatly increased with the
cutting-edge laser, armor, reduced signature, and other
technologies. He will also obtain a real psychological edge,
especially from his much improved situational awareness.
The 2005-2025 Technologies.
The years following the MOUT ACTD will see
breakthrough technologies as well as improvements to
MOUT technologies that will ultimately comprise the
revolutionized Warfighter System.
This section describes some of those potentialities, but it
is by no means a complete list. Many of the future
technologies have widespread application; very few are
peculiar to the military. A few “blue sky” or “stretch”
technologies (not considered achievable by circa 2025) will
also be outlined here, along with a few that do not fall into
the Warfighter System definition. They are included
because of the enormous impact they could have on the
individual warfighter.
44
Some of the 2005-2025 potential technologies may not
hit their targeted time table for a number of reasons. It is
reasonable to assume those technologies coming to fruition
after 2005 may still offer the best to be had at 2025. The best
that can be done is to put forth possibilities with the caveat
that unexpected technological breakthroughs are sure to
occur, and the military will be watching for them and
responding to them.
The taxonomy for the promising Warfighter System
technologies is warfighter capabilities. The most
appropriate category for a given technology may be
arguable, but that illustrates the synergy that can be gained
by looking at the warrior as a system. For instance,
improving the warrior’s lethality is going to affect his
survivability, just as improving his mobility may also
improve his survivability.
Survivability. “Smart” materials will give new meaning
to the words “stealth and survivability” and will have
tremendous payoffs. One example is a chameleon-like
uniform material that renders the warfighter virtually
invisible. Another is a ballistic material based on spider
silk. This ballistic material will be, inch-for-inch, stronger
than steel, but lighter than cotton, and will offer comfort
and mobility along with survivability.
Chemical-biological protection from smart materials
technology is also emerging. One possible technology is
molecular imprinting. In this case, a polymer membrane
“traps” threatening molecules when they match the
imprints of noxious substances. The other is a gated
membrane technology. A material embedded with this
technology will breathe like regular clothing until a CB
agent is detected, and then the membrane will close off.
With either technology, the bulk of the current CB
protective suit bulk will be a thing of the past, much
improving the warfighter’s comfort and mobility.16
Sensor technology will also play a large role in
survivability. Embedded in clothing or other gear, sensors
45
not only will be able to detect CB agents, they could also
cancel the effects of body temperature, obscuring battlefield
signature. They will also be able to monitor the location of
the wearer and the enemy, and provide other battlefield
intelligence. The notion is to link all this information.
A key sensor for improving survival is a bioanalysis
system which will electronically relate real-time warrior
body status (e.g., vital signs, penetration from projectiles,
blood loss) to a central monitoring site.18
One form of medical CB protection could be a reactive
vaccine (administered after exposure) which would stop the
damage by attacking and neutralizing the agent or by
repairing the actual damage.19
Warfighters should be able to grow new organs from
their own tissue thanks to advances in human genome
mapping, and a stretch will be replacement limbs fabricated
of artificial tissues.20 While those two technologies fall
outside the Warrior System definition, they merit mention
because of their implications for the rear-area medical
support available to the warfighter.
S u st ain abilit y. Ther e wi l l be c onsi d er abl e
improvements in rations by 2025. For instance, food should
be more concentrated and lighter, and there could be a
transdermal (through-the-skin) nutritional system.21 This
system would be comprised of time-released nutriceutical
substances tailored to the individual’s needs, which would
go directly into his system through patches or lotions. The
transdermal system will not truly substitute for food, but it
will meet nutritional needs when food is not available.22
Bioprocessing will eventually revolutionize logistics and
lighten the warfighter’s load. He will be able to create food,
water, and ammunition components from substances
locally available. The warfighter will no longer have to carry
those items, or at least not as many of them. Bioprocessing
does not fall into the strict Soldier System definition, but
would alter the warfighter’s life on the battlefield.
46
The generation of sustainment items will probably not
become a reality in the 2025 timeframe, except for the
water. It is possible that by 2025 an individual water
purifier will be able to filter heavy metals, the only
substances it cannot filter today. The warfighter could then
carry a small purifier or packet of chemicals instead of
carrying water in those areas where water is available.
Command, Control, Communications, Computers, and
Intelligence (C4I). This area is rife with possibilities. A
single chip embedded in a warrior’s clothing may be a whole
miniature satellite communication system comprised of
micromechanical devices that could be controlled by voice,
gesture, or thought.23 Sensors will allow a warfighter to
“see” through any weather, foliage, and other obscurants, as
well as detect CB agents.24 One distinct possibility for a CB
sensor may come through micro-electro-mechanical-system
(MEMS) technology. MEMS could replace cumbersome
$17,000 laboratory spectrometers, which determine
chemical composition of substances, with a $20 device that
the warfighter could hand carry.25 Biosensors may someday
detect the presence, and maybe even the status, of enemy
soldiers by detecting smells and other signatures. This
capability is a stretch, but “breakthroughs by 2020 would be
possible if enough resources are applied.”26
Pharmaceutical enhancements could contribute to the
warfighter’s sense of control in battlefield situations. These
pharmaceuticals could target specific areas of the brain and
increase or extend cognitive, psychological, and
physiological functions. The warfighter’s memory could
improve along with his attention span. He could suffer less
fear and stress, and be more alert. He could be physically
stronger and sleep better. He could deal with information
overload and make better decisions. A stretch in
performance enhancers would be those that combat fatigue
and hunger. 27 Another stretch technology would be
man-machine interfaces allowing the warfighter to control
equipment from afar with his or her mind. While this
speculation might evoke a chuckle, it is not as blue sky as it
47
seems. Several automobile manufacturers are now trying to
develop headrests that pick up signals from the driver’s
mind to control automotive functions.28
Advances in the traditional computing technologies will
continue. Computer systems will become much more user
friendly, and will be smaller and lighter. Voice activation
will be commonplace. Information overload will also be
tackled with “smart agent” computer applications. However, a whole new computing technology, biocomputing, will
bring unprecedented changes. Biocomputing is predicated
on DNA-based storage and has widespread military
applications. A DNA chunk the size of a sugar cube could
hold 10 petabytes (10 million billion) of data. The individual
soldier could have a small computer with billions of bytes of
information, with everything from a complete language
dictionary, to topographically accurate maps, to guides to
the local flora and fauna if he is forced to live off the land.29
There are several other possible biotechnology
applications to future complex integrated C4I systems. For
example, sensors could be linked with biocomputers which
warfighters could instruct by consciously altering their
brain waves or by voice pattern signals, putting warfighters
in a position to communicate more effectively with their
machines.30
Lethality. While MOUT ACTD weapons technologies
will presumably offer lethal and non-lethal contributions to
the future warfighter, the development of precision indirect
fires is required because of the greater lethality they offer.
The indirect fire technologies do not fall into the definition of
Warfighter System, but they have a profound impact on the
battlefield. The warfighter would have less weaponry and
ammunition to carry, lightening his load and improving his
chances for single shot kills—a real psychological coup.
Anti-materiel weapons also have promise. They will
feature agents that react in such a way to destroy the
intended target, such as rubber-eating microbes, or
microbes that consume silicon, electronics, or Kevlar.
48
Genetically-designed weapons that are based on DNA of
a target, such as the genetic sequence of an enemy leader, or
those that are targeted on a bodily function such as sight or
motor ability, may eventually be pursued. While these are
ethically arguable and run counter to the Biological
Weapons Convention, research will be needed to counter
such weapons should enemy forces possess them.31
Mobility. New or improved airdrop technologies will
allow for high tempo insertion of small units at many
different locations, providing an edge in maneuver. There
will be no time delays associated with personnel and
equipment link-up. These technologies will also allow soft
landings and a concomitant reduction in damage and
injuries.32
CONCLUSIONS
The future warfighter will be part of an elite joint force
which represents an expensive investment not easily
replaced. The economics involved in the training and
sustainment of such a force dictate that these warriors have
the cutting-edge warfighting tools and technologies. The
Warfighter System will be a vital prerequisite to
dominating maneuver and will also allow the military to
meet urban warfare challenges. Since the dismounted
warfighter has been, and will continue to be, the common
denominator in the spectrum of conflict, it is an investment
choice that can be made with utmost confidence.
Like traditional major acquisition programs, the
Warrior System program must be steadily funded and
centrally managed. Programmatic oversight should reside
at the highest organizational levels. Unlike traditional
prog rams, th e War f i ghter Sys tem p os es uni que
considerations for doctrinal, psychological, personnel,
training, and technological spheres. As such, it needs
special organizational structures and procedures.
An overarching systems approach is required that can
fuse all the Warfighter System’s aspects—materiel and
49
otherwise. The system’s designers must carve out a
long-range program showing a balanced approach and
defined priorities. This will instill confidence in program
success at the highest military levels and in Congress, thus
enhancing prospects for adequate funding.
ENDNOTES - CHAPTER 2
1. Office of the Secretary of Defense, Tactics and Technology for
21st Century Military Superiority: Final Report, Vol 1, Washington:
Defense Science Board, October 1996, pp. 11-5 - 11-13; Douglas A.
MacGregor, Breaking the Phalanx: A New Design for Landpower in the
21st Century, Westport, CT: Praeger Publications, 1997, pp. 1-19.
2. Philip Brandler, Acting Technical Director, Natick Research,
Development and Engineering Center, “The Army After Next (AAN),”
memorandum for Commander, U.S. Training and Doctrine Command,
ATTN: ATCG-S (Dr. Paul Berenson), Fort Monroe, VA, July 2, 1996,
para. 2d.
3. Ibid., para. 2c.
4. Tactics and Technology, p. V-12.
5. Ibid., pp. II-3—II-9.
6. MacGregor, pp. 59-93.
7. Tactics and Technology, pp. III-17—III-20.
8. A. Fenner Milton, “Soldier Systems: The Path to the Army After
Next,” Briefing of Major General Robert Scales, Washington: Office of
the Deputy Assistant Secretary for Research and Technology, February
19, 1997, unnumbered page.
9. Sean D. Naylor, “What the Future Holds . . . ,” Army Times,
March 17, 1997, p. 22.
10. Tactics and Technology, p. II-9.
11. “Infantry System Turns Soldier Into High-Tech Urban
Warrior,” National Defense, Vol. LXXXI, April 1997, p. 24.
12. Tactics and Technology, p. III-17.
13. Ibid.
50
14. Ibid., p. III-20.
15. Brandler, para. 2a.
16. Ibid., para. 2g.
17. Steven Kenney, et al., Biotechnology Workshop 2020, May 29-30,
1996: Summary Report, SAIC Document No. 96-6963 &SAC, McLean,
VA: Science Applications International Corporation, undated, p. 29
(hereafter SAIC).
18. Brandler, para. 2c.
19. SAIC, Tab H, p. 3.
20. Joseph A. Engelbrecht, Jr., et. al., “Alternate Futures for 2025:
Security Planning to Avoid Surprise,” Research paper presented at Air
Force 2025, p. 153; Robert Langer and Joseph Vacanti, “Artificial
Organs,” Scientific American, September 1995, Vol. 273, No. 3, p. 131.
21. Kenny, et al., p. 22.
22. Brandler, para. 2j.
23. Engelbrecht, et al., p. 181.
24. Tactics and Technology, p. V-21.
25. John Markoff, “New Wave in High Tech: Tiny Motors and
Sensors,” New York Times, January 27, 1997, p. 1.
26. Kenny, et al., p. 28.
27. Ibid., p. 36.
28. Biotechnology Workshop 2020: Readings, Tab H, p. 12.
29. Ibid., Tab H, pp. 8-9.
30. Kenny, et al., p. 29.
31. Biotechnology Workshop 2020: Readings, Tab H, p. 3.
32. Brandler, para. 2b.
51
CHAPTER 3
UNMANNED AERIAL VEHICLES:
PROMISES AND POTENTIAL
Arthur J. Sosa
All the business of war, and indeed all the business of life, is to
endeavor to find out what you don’t know by what you do
know; that’s what I call guessing what was at the other side of
the hill.
Duke of Wellington1
INTRODUCTION
The concept of Unmanned Aerial Vehicles (UAVs) began
with the appearance of target drones in the 1940s. Shortly
thereafter, a veil of secrecy fell over UAV research, and their
operational capabilities were developed covertly. Nearly 50
years later, during Operation DESERT STORM, UAVs
came to the attention of the general public through
extensive war reporting, highlighted by reports of Iraqi
soldiers with arms held high, attempting to surrender to a
circling UAV. The Gulf War became the latest proving
ground to evaluate UAV capabilities in combat and their
potential role on the modern battlefield.
My experiences as an Army Attack Helicopter Company
Commander and Combat Aviation Battalion Commander
have taught me the value of aerial weapons platforms on the
battlefield as a combat multiplier. The success of Operation
DESERT STORM was made possible through the unique
synergy of men and machines in cohesive units. The
operation also underscored the vulnerabilities of the human
and the machine in that equation. Machines can fail, but
more often it is a human operator exceeding personal
limitations that becomes responsible for turning aircraft
53
into scrap metal. High stress mission conditions, fatigue,
poor weather, and reliance on night vision devices increase
pilot workload and risk. These factors create pilot errors
which are responsible for the majority of aircraft accidents.
It still takes less time to build a combat aircraft than to
recruit, train, and qualify the pilots who will fly it in combat.
Encounters with enemy air defense systems, enemy air
assets, and enemy small arms fire are predictable, potent
threats when U.S. forces deploy into a hostile theater of war.
What high risk roles can be performed by unmanned
aircraft? Which must be performed by manned aircraft
regardless of risk?
In this information age, emerging electronic and
aviation design technologies are melding in UAVs. These
factors in combination increase mission capability while
enhancing aircraft and human survivability. For purposes
of this paper, I shall restrict my remarks to unmanned
systems except in those circumstances where a comparison
to manned systems would be helpful for clarification.
A BRIEF HISTORY OF UNMANNED FLIGHT
Unmanned aircraft may appear as a novel concept to
some outside the military community. This is hardly
startling, considering that the early use of unmanned
aircraft was subject to security classification. A civilian
resident of Carlisle, Pennsylvania, working at the War
College overheard several of my colleagues discussing their
research papers. At a quiet moment he turned and asked
me, “What are you researching?” “Unmanned Aerial
Vehicles," I replied. This immediately drew a puzzled look,
and then my acquaintance said, “Oh yeah! My son has one of
those. He flies it at a big field outside of town.”
The potential of UAVs can be better understood through
the events that led to their development. The rapid progress
and growth of the UAV program open our imagination to
further possibilities for improving current capabilities and
exploring new military applications for the future defense.
54
The protection of American citizens is one of the stated
vital interests of the United States. An American hostage or
prisoner held by an enemy creates political leverage for that
enemy to exact concessions from the United States. This
was clearly demonstrated by the downing of a U-2 spy plane
and capture of pilot Francis Gary Powers by the Soviets in
1960. The incident occurred only a few years after President
Dwight D. Eisenhower had proposed mutual aerial
surveillance or “Open Skies” to ease tensions between the
Soviet Union and the United States. When overflight
privileges were denied by Soviet Premier Nikita
Khrushchev, President Eisenhower covertly authorized
overflights of the Soviet Union to maintain surveillance of
the growing Russian military. Embarrassed by the incident,
President Eisenhower was compelled to make a public
statement announcing terminatation of U-2 flights over the
Soviet Union.
Two months after the Powers shootdown, a similar
incident occurred. The Soviets downed an American RB-47
aircraft over the Barents Sea between Norway and Russia,
50 miles from Soviet territory. Two of the crew members
survived and were taken prisoner. However, three
American lives were lost, and further embarrassment for
the United States ensued. These incidents forced the United
States to explore alternatives to its manned reconnaissance
program. Intelligence analysts believed the growth of Soviet
military power demanded a surveillance capability to
provide critical reaction time for U.S. forces if needed. Aerial
reconnaissance was the best means to satisfy this
requirement, but further risk of American pilots was not
acceptable. Initial feasibility studies of UAVs grew out of
this realization.
“Red Wagon” was the code name for the first flight
demonstration of target drone aircraft modified for
reconnaissance use. The highly classified project began in
July 1960, shortly after Powers’ U-2 was shot down. The
drone was developed by the Ryan Company, a manufacturer
of target drone aircraft. It was advertised as
55
a ground controlled target flying at near sonic speed and at
altitudes in excess of 60,000 ft. It was to be flying for more than
six hours while being engaged by surface to air missiles in an Air
Force Training program against high flying enemy aircraft.2
This cover story was intended to disguise the true purpose of
the tests.
Meanwhile, U.S. policy with respect to UAVs continued
to develop. A report from Dr. Harold Brown, Director of
Defense Research and Engineering in 1961, summarized
the issues and requirements of aerial reconnaissance
programs:
The suspension of overflights (by U.S. over Russia) and
peripheral operations by U-2 aircraft is political in nature and
has deprived the United States of its most effective aerial
intelligence collection capability.
The fact that Sino-Soviet Bloc capabilities, both offensive and
defensive, are dynamic and aggressive, dictates that an almost
constant surveillance be maintained to insure maximum US
combat effectiveness. This requires high resolution (1 foot)
photographic coverage of selected areas and of specific targets
within these areas.
Based on the preceding remarks, the following criteria are
proposed for use in the selection of any future vehicle that will be
used for overflights:
Unmanned. For political, diplomatic and public acceptability.
Operate independent of foreign and U.S. overseas bases. Not
dependent on a third country for support and/or policy. It could
be recovered over international waters.
Lead Time. Recommend that the study phase of a drone
program be undertaken immediately.3
Clearly, a need exists for accurate aerial-photo
intelligence data without the political liability of a dead or
captu red av iator . H owever , bud get battl es f or
modernization and research funding continued to impede
56
UAV progress. At this time, the Soviets were supplying
missiles to Cuba. In October 1962, Major Rudolph Anderson
was killed when his U-2 was hit by a surface-to-air missile
(SAM) over Cuba. At that time, only two UAVs were mission
capable. The Cuban missile crisis in 1962 prompted
additional funding for reconnaissance.
The earliest combat use of UAVs occurred in Vietnam.
Twenty-eight different configurations of UAVs flew from
1962 through 1975, involving over 3,435 operational sorties.
The missions flown by the Vietnam War UAVs included
both day and night photo reconnaissance missions, photo
missions over the Hanoi Hilton prisoner of war camp, and
other battle damage assessment (BDA) photos of Hanoi
from 2,000-3,000 feet. 4 However, there were also
alternative special purpose UAV payloads used during the
Vietnam War. For example, several 147NA/NC UAVs were
maintained on standby for possible pre-strike electronic
countermeasures (ECM) chaff-dispensing missions. An
undetermined number of UAVs were used for electronic
intelligence or electronic countermeasures missions. Over
29 UAVs, called “bullshit bombers,” were launched to drop
leaflets. The appendix also offers several examples of
unmanned systems serving as decoy aircraft.5
In Vietnam, off-the-shelf-technology was successfully
adapted to enhance aerial reconnaissance capabilities. This
field experience is a proof of concept for UAVs, creatively
demonstrating a potential for expanding their missions.
The UAV project engineers evaluated many advanced
technology concepts, which included:
•
•
•
Prototype low observable (Stealth) designs to reduce
radar signature.6
Radar altimeter low altitude control system to hug
terrain.7
Integration of LORAN for position accuracy within
200 feet.8
57
•
•
•
Unmanned flight to 65,000 feet at nearly the speed of
sound.9
UAV suppression of enemy air defenses (air to surface
missile).10
UAV bomber (1964) with a 250-pound bomb.11
The second and third order effects of the UAV program
could have surfaced in the 1960s by spin-off research
developments, but the doctrine and the culture were slow to
adapt to the potential opportunities offered. In the Air
Force, advocacy for unmanned systems was seen as a vote
against manned aircraft, tantamount to career suicide for
senior aviators.
How did manned systems and unmanned systems
compare? It is reducing risk and the related cost in human
lives that is really at the center of the issue. William
Helmich, Ryan Company’s Program Manager for their
Air-to-Surface Missile Project, offered one prophetic
opinion:
The drone runs about one-tenth the cost of a (1970 vintage)
manned jet fighter, which carries one or two pilots each. And,
everyone wanted to cut down on the number of guests in the
Hanoi Hilton, and this (Ryan 234 armed UAV prototype) is one
way to do it.12
U.S. UNMANNED AERIAL VEHICLES TODAY
Unlike during the Vietnam era, the current UAV
Program is a joint service program with participation by all
services. The Defense Airborne Reconnaissance Office
(DARO) manages the Defense Airborne Reconnaissance
Program (DARP) and is a focal point for all airborne
reconnaissance matters.13
The Joint Requirements Oversight Council (JROC) sets
priorities for the Department of Defense (DoD) by allocating
funds to key projects. Tactical UAV (TUAV) is the number
58
one UAV program priority. TUAVs are represented by two
distinct systems called Pioneer and Outrider. The second
and third priority projects, respectively, are the Predator
and High Altitude Endurance UAVs.14 These separate and
unique UAV projects are the core of the DARP. Each UAV
system has the potential of being tasked to perform a
variety of missions with each individual service
component.15
The TUAV will eventually support Army battalions,
brigades, and light divisions as well as deployed Navy units.
The TUAV mission is to provide near real-time,
reconnaissance, surveillance, and target acquisition
(RSTA) and BDA.16 Currently both the Pioneer and Hunter
UAV systems are filling this role. An Advanced Concept
Technology Demonstration (ACTD) design called Outrider
is being evaluated as a replacement for Pioneer and Hunter.
Outrider’s operating range is over 200 kilometers, nearly
twice the range of the previous systems. It is more easily
deployable than the earlier systems, requiring only a single
C-130. Both Hunter and Pioneer would require multiple
C-130 or C-141 sorties. Each of these TUAV systems uses a
Global Positioning System (GPS) for navigation and cruises
at approximately 90 knots air speed (90 nautical
miles/hour).17
The Predator is the Medium Altitude Endurance or Tier
II UAV. This system was a ACTD and is now in production.
It has a mission range of over 500 nautical miles,
approximately five times that of the TUAVs. Predator has
20 hours fuel endurance, cruising at 70 knots. Satellite
communication (SATCOM) allows near real-time
transmission of reconnaissance and target acquisition data
from over the horizon, beyond electronic line of sight. This
system is the first to incorporate a de-icing capability,
essential for flight operations in cold weather. The Air
Force’s 11th Reconnaissance Squadron at Nellis Air Force
Base, Nevada, formed in August 1995 was the first UAV
unit equipped with Predator. The Predator system is called
59
Tier II because of features that surpass the capabilities of its
UAV predecessors.
The Global Hawk is a Tier II+ UAV. This is a
conventional high altitude endurance system currently in
testing and development, with a first flight planned for
March 1997.18 Its aft-mounted jet engine distinguishes it
from the other UAV propeller driven systems. The jet
engine allows Global Hawk to fly over 345 knots, almost four
times the airspeed of previous systems, and to attain a
range of 3,000 nautical miles. This Teledyne Ryan built
UA V resemb les a U- 2 i n si ze and s hap e. Its
transcontinental flight capability could replicate the
Francis Gary Powers’ U-2 flight easily, and, arguably, since
it is unmanned, do so without the same potential political
liabilities. The payload is similar to that of the other
systems which use electro-optical/infrared and synthetic
aperture radar. These sensor systems provide day-night
and all-weather imagery capability. Survivability is
achieved by its high altitude stand-off and its self-defense
measures. The phrase “global” is well suited to this UAV;
with its strategic range, Global Hawk is self-deployable
worldwide.
DarkStar is the Low Observable High Altitude
Endurance or Tier III(-) UAV. In this context, Low
Observable means stealth capable. The Darkstar is the only
U.S. produced UAV with true stealth design. Owing to its
stealth focus, DarkStar will not achieve the same overall
flight performance as the Global Hawk, but should attain
over 250 knots airspeed for more than 8 hours endurance,
reaching altitudes over 45,000 feet. The payload capacity,
although not fully described in the open literature, appears
to be less than Global Hawk as well. The DarkStar sensor
payload includes either an electro-optical or synthetic
aperture radar, not both systems like Global Hawk.19
DarkStar trades air vehicle performance and payload capacity
for survivability against highly defended air defenses by
minimized radar return. This UAV is still in the developmental
60
and test flight stage with production scheduled to begin in the
year 2000.20
Larry Lynn, Director of Defense Advanced Research
Projects, states that “DarkStar will demonstrate a
warfighting capability that the United States has not had
since the early days of the SR-71 Blackbird and the U-2
Spyplane.”21
Each modern UAV system possesses unique flight
characteristics and capabilities to support the Joint Task
Force Commander on the modern battlefield. Joint
command and control of these assets require rapid
facilitation of in-flight handoffs of mission aircraft and
seamless sharing of data. To accomplish this, DARO is
developing two types of UAV ground control systems. Two
distinct types of ground control links will support the
Tactical and the High Altitude Endurance UAVs,
respectively. The Tactical Control System (TCS) is designed
for TUAVs supporting the close battle without going beyond
the horizon. The Common Ground Segment for the
relatively autonomous high altitude endurance UAVs
provides high data exchange rates and multi-payload
functionality for significantly more complex missions
beyond the horizon.22
The nature of UAV missions is directly influenced by the
threat environment, distance to the area of interest, and the
payload components required. The fiscal year 1997 UAV
sy stems a n d payl oad s d emons tr ate si gni f i c ant
improvements over Vietnam era reconnaissance pilotless
vehicles (RPV). These improvements cut UAV size and
weight, upgraded electronics to smaller high efficiency
integrated circuits, and achieved real-time data sharing via
SATCOM data linkages. UAVs provide responsive coverage
of large geographic areas of responsibility, quicker than
possible by repositioning reconnaissance satellites. This
advantage in responsiveness is critical to many JTF
Commander intelligence requirements. In an effort to
expand the UAV flight mission, the DARO program
61
managers are looking to the most promising technologies for
new applications
THE POTENTIAL IN UAV MISSION PAYLOADS
Several new UAVs are in development and testing.
These systems represent significant product improvements
over the Ryan platforms used during Vietnam. Let us now
examine the potential that technology offers for alternative
payloads and expanded UAV roles and missions.
On January 16, 1996, Dr. Paul Kaminski, the Under
Secretary of Defense for Acquisition and Technology,
identified primary enabling technologies and architectural
concepts that are vital to achieve battlefield dominance.
One or more of these technologies are relevant to all high
technology military systems. Several of the following
technologies will be applied to UAV system development:
•
Advanced processing;
•
Automatic target processing;
•
A common grid;
•
Distributed and open architectures;
•
Sequential application of off board collectors;
•
Data compression;
•
Very large, dynamic, object-oriented data bases;
•
Data storage;
•
Data dissemination; and,
•
Planning analysis tools.
Battlefield dominance thus relies heavily on automated
information processes or information dominance.
Predictably, information requirements of battlefield
62
commanders will vary in terms of quantity, quality, and
timeliness, according to their role in the close, deep, or
theater fight. UAV systems will require an advanced C4I
(Command, Control, Communication, Computers, and
Intelligence) infrastructure for collection, processing, and
dissemination to meet the unique needs of commanders at
all levels.
UAVs are critically dependent on computer data
processing, data compression, storage, and high speed data
transmission for navigation and flight profile. The UAV
mission equipment will also need a high speed data
dissemination capability to feed the C4I infrastructure and
serve its subscribers. Fortunately, the technology sectors
that engineer multimedia microchip capacity, computer
processing, and high speed data modems produce
significant improvements with regularity in the private
sector. Private sector automation technology directly
supports some UAV development programs, thus reducing
costs. New directions in UAV missions have been well
described by Rear Admiral Barton Strong, Program
Executive Officer, Cruise Missile and Joint Unmanned
Vehicles Office:
In developing effective and affordable UAVs and ground
control systems we need to prepare for both core and specific
UAV missions. The core missions include day or night
reconnaissance, surveillance and target acquisition (RSTA);
combat assessment (CA); and battlespace management. As
new payloads become available, more specific UAV taskings
will evolve to include adjusting indirect fire; close air support;
deception operations; search and rescue (SAR) and mine
detection. Our list of potential “real time or near real time”
UAV missions is growing.23
A clear indication of the program managers’ intent to
explore the potential of UAVs for missions beyond the
historical aerial reconnaissance mission is reflected in the
fact that the DARO approved 16 proof-of-principle
demonstrations of UAV payloads, which are described in
Table 1.
63
Demonstration Payload
Potential Mission Application
Meteorological Sensor
Radiac Sensor
Light-weight Standoff Chemical
Detector
Light-Weight Communications
(COMINT) payload
Acoustic Wave Chemical Detector
Hyperspectral Sensor
Coastal Reconnaissance and
Analysis
Tactical Remote Sensor System
Communications Relay
Systemic atmospheric readings
Plot suspected NBC contamination
Detect and plot toxic agents
Electronic Intelligence Payload
Radar Jammer Payload
Light-weight COMINT Payload
Communications Jammer Payload
Tactical Meteorological System
Find/identify ground
communications emitters
Detect/plot low level chemical agents
Detect hidden/difficult targets
Detect mines (day/limited visibility)
BLOS* ground sensor data relay
BLOS communications relay for
ground forces
Locate/identify enemy ground forces
Jam enemy ground radars
Find/identify ground
communications emitters
Jam both radios and data links
Weather from remote/denied areas
*Beyond Line of Sight
Table 1.
24
UAV Joint Program Office Payload Projects.
The goal of each payload project as shown in Table 1 is to
provide battlefield commanders with additional means to
achieve battlefield dominance. As of this writing, results of
these proof-of-principle demonstrations are unavailable.
However, some initial information has been released, for
example, the Defense Advanced Research Project Agency
(DARPA) reported promising results on feasibility tests
using ultra-wide band radar (UWB) to detect buried mines.
However, according to the report, mine-detecting radar
operating from a UAV at altitude will require a significantly
higher power supply than used in ground tests.
Furthermore, precise location of small mines is difficult
with UAVs, even with dual GPSs.25 Additional testing is
planned.
64
A report in the Journal of Electronic Defense described
tests of four different payloads installed in a UAV for
electronic warfare potential. One payload performed
precision direction finding using high frequency (HF), very
high frequency (VHF), and ultra high frequency (UHF)
bands. A second payload autonomously recognized and
jammed “enemy” VHF and UHF transmission. A third
payload tested radar electronic warfare, and the fourth
payload was a tactical radar jammer to counter pulse,
pulse-doppler, and continuous-wave radar threats. All
payloads performed well in the initial concept tests. It is
now up to the services to analyze the data and then decide
whether they will develop programs for UAV electronic
warfare payloads.26
The concept of armed or lethal UAV systems is also being
tested. One defense publication reported that a UAV-flown
laser targeting system successfully guided anti-armor
missiles to four out of five targets.27 In another report,
General Charles Krulak, Commandant of the Marine
Corps, announced that the Marine Corps was assessing the
development of UAV bombers in recent tests conducted at
Aberdeen Proving Grounds.28 The concept of using UAVs for
a weapons delivery platform originated in 1953 and was
tested in 1964, using two 250-pound bombs from a Ryan
Firebee RPV.29 There is a variety of possible armed UAV
prototypes.
The first launch of an air-to-ground weapon—a
Maverick missile—from a UAV was made on December 14,
1971.30 The UAV, a Teledyne Ryan BGM-34, was recovered
after firing, confirming the proof-of-principle. This project
was originally designed to assist Israel in maintaining a
balance of power with Egypt by providing a low cost weapon
system to counter the Russian SAM and AAA batteries in
Egypt.31 Anti-radar “harassment drones and decoys have a
major role in efforts by the Israeli Air force to defeat hostile
air defenses.”32 ARMADA magazine reports that six nations
presently have attack UAVs.33 In addition to Israel, these
65
nations include Iran, Israel, Germany, France, South
Africa, and the United States.
As can be seen in Figure 1, many nations are coming to
realize that UAVs provide cruise missile capability at a
fraction of the cost. A hostile UAV carrying a lethal payload
could reach the United States from a number of locations.
Consider the domestic and international impact associated
with chemical or biological agents dispensed by UAV.
Suddenly, terrorists could have an accurate, long-range
delivery means for weapons of mass destruction (WMD).
Non-proliferation of UAV technology is clearly a national
security issue for the United States.
50
40
30
20
10
0
1986
1991
1996
Nations with UAVs
Figure 1.
34
Proliferation of UAVs.
The Missile Technology Control Regime (MTCR) is a
voluntary agreement to prevent the proliferation of missiles
capable of nuclear delivery, which covers cruise missiles
and related technologies.35 The MTCR specifically prohibits
the “export of unmanned aerial vehicle systems (including
cruise missile systems, target drones, and reconnaissance
drones) capable of delivering at least a 500 kilogram
payload to a range of 300 kilometers.”36 The MTCR was first
established in 1987 and now has 25 countries participating.
66
The United States is a charter member of the MTCR and
has taken a strong stand in support of weapons control
agreements including armed UAVs. The following
statement appeared in the 1995 UAV Annual Report:
We will continue to monitor advances in the arms control
arena and ensure treaty compliance. In addition, to preclude
any future misunderstanding about UAVs as weapon
platforms, the DARO has made it clear that it has no plans to
develop or test armed reconnaissance UAVs.
Clearly there has been a major reversal in U.S. policy in
the last 2 years; concept tests of armed UAVs are now
allowed. Oddly, there is no mention of this significant
change in policy in the 1996 UAV Annual Report.
The UAV program addresses the airworthiness of each
system and the opportunities this technology offers to
commanders at every level. Emerging technologies as
buttressed by over 40 years of experience with UAVs have
led to a family of uniquely capable air vehicles that allows
U.S. forces to dominate the battlefield without incurring
unnecessary risks to aircrew members. However, the
proliferation of UAV technology is tantamount to handing a
cruise missile to a hostile nation as a delivery means for
WMD. We have come far in those 40 years, but did we come
far enough? Let us consider what the future applications for
UAVs could and should be.
RECOMMENDATIONS FOR THE FUTURE
Three primary recommendations emerge from this
review of UAVs. First, we should increase the commitment
on the part of all services, especially the Air Force, to
maximize UAV capabilities. Second, we should research
UAV fighter aircraft. Third, the United States should
monitor international efforts for development and sale of
UAVs and related technology.
As to service commitment on behalf of UAVs, I do not
advocate a UAV program as a substitute for airpower. There
67
can be no replacement for tactical or strategic lift capability.
UAVs are ill suited for lift purposes. UAVs are better suited
for aerial reconnaissance, communications relay, electronic
warfare, and radar jamming missions. Nonetheless, UAV
systems should have achieved greater integration into the
military overall and into the Air Force in particular.
Considering this nation’s over 40 years experience with
UAVs, it is amazing that there is only one Air Force UAV
unit in existence. Furthermore, several of the payload
concept tests mentioned earlier merely repeat similar tests
conducted during the 1960s and early 1970s. Microchip and
miniaturized on-board computers are providing the UAV
with a virtual cockpit capability. This virtual cockpit and
alternative payloads will make new UAVs even more
functional as aviation assets than in the past. Richard T.
Wagaman, former President of the Association of
Unmanned Vehicle Systems, tells us that:
UAVs are being used for more functions every day. The military
UAV missions are obvious and have been addressed many
times. The non-military government and commercial
unmanned aircraft functions will yield a yearly market
exceeding one billion U.S. dollars by the turn of the century.
[and] will likely exceed $2 billion by 2005—just 10 short years
away.38
It would be a telling indictment if the private sector
realizes the enormous potential of UAVs before the military.
A spark is needed. It is time for a new generation of Hap
Arnold’s or Billy Mitchell’s to lead a cultural revolution to
further the unmanned revolution in military affairs.
The second recommendation deals with the U.S. need to
research a UAV fighter concept. This concept offers some
economy compared to manned systems—an alternative to
large numbers of high technology manned fighter aircraft. A
small number of UAV fighters could serve in the first wave
of a high risk theater campaign to whittle down enemy air
defenses. This would effectively preserve manned systems
for later lower-risk missions. The question of whether to
68
rely on threat-based or capability-based weapons systems to
support U.S. national security strategy becomes irrelevant
if UAVs can do both cost efficiently. Consider the potential
benefits of a UAV fighter in terms of cost avoidance (benefits
1-5) and operational capabilities (benefits 7-9; benefit 6
applies to both):
1. No ejection seat/no oxygen system (low cost/less
weight);
2. A virtual cockpit: no flight controls or pilot safety
systems;
3. No ergonomic studies of cockpit design (low cost);
4. Potentially less time & cost to replace a combat UAV
than replace a combat fighter and pilot;
5. If feasible, convert current aircraft to UAV for testing;
6. Reduce fratricide: real-time/gun camera slow-motion
and stop-action imagery, thus improving target identification;
7. Fly by wire (F-16 type) control system would connect
through on-board computer to ground control system;
8. Extremely high g-maneuvers (exceeding human
capacity); and,
9. Precise close air support: combine gun camera
targeting with laser guided munitions.
An ironic but significant justification for unmanned
fighters (in lieu of manned versions) is to increase the
aircraft’s capability by removing the human constraint.
Pilots generally cannot sustain more than 6-7 Gs. In a tight
turn, a fighter aircraft can easily develop G-forces that will
cause pilots to lose consciousness. UAVs are already capable
of exceeding 8 Gs, sufficient to outmaneuver manned
systems in aerial combat. In 1971, this air-to-air concept
was tested informally in mock dog fights, pitting an
unarmed UAV against veteran Navy pilots in two F-4s with
Sparrow and Sidewinder missiles. The UAV repeatedly
69
outmaneuvered the F-4s and was not hit.39 This capability
may be as significant as stealth in aircraft survivability,
providing the best countermeasure against enemy UAVs.
The final recommendation deals with monitoring
international development and sale of UAV technology.
This will become increasingly difficult if Mr. Wagaman’s
assessment for the growth potential of the nonmilitary
market for UAVs proves correct. He claims that the annual
nonmilitary UAV market will double to $2 billion. For
example, UAVs may be used for dusting crops, highway
traffic surveillance, counterdrug operations, border
surveillance, and nuclear power plant or chemical plant
discharge monitoring. In each of these examples, a common
operational theme emerges. Extended, monotonous, and
high-risk hazardous operations entail technologies that
make UAVs attractive to civilian as well as military
application. The UAV is clearly a dual use technology,
ultimately capable of crop dusting farms as well as
delivering biological toxins and nerve agents to the
battlefield. The United States must be prepared for a
two-fold challenge:
•
•
Prevent rogue nations from gaining a delivery means
for weapons of mass destruction, and
Devise countermeasures for highly maneuverable,
stealthy enemy UAV aircraft.
CONCLUSION
The United States DoD must maintain a balanced
military capability to protect national interests and project
power. This must be done without eroding the national
economy or vital domestic interests. UAV systems offer a
unique opportunity for a true revolution in military affairs
and a cost-effective alternative to a large manned aircraft
fleet.
70
ENDNOTES - CHAPTER 3
1. As quoted in Jay M. Shafritz, Words on War, New York: Simon &
Schuster, 1990, p. 208.
2. William Wagner, “Lightning Bugs and Other Reconnaissance
Drones,” Fallbrook, CA: Armed Forces Journal and Aero Publishers,
1982, p. 17.
3. Ibid., p. 19.
4. Ibid., p. 202.
5. Ibid., p. 99.
6. Bill Sweetman,“The Invisible Men,” Air & Space Smithsonian,
April/May 1997, p. 19.
7. William Wagner, p. 175.
8. Ibid., p. 194.
9. Ibid., p. 166.
10. Ibid., p. 182.
11. Ibid., p. 174.
12. Ibid., p. 185.
13. Defense Airborne Reconnaissance Office, UAV Annual Report,
FY 1996, November 6, 1996, p. 1.
14. Ibid.
15. Ibid., p. 31.
16. Ibid., p. 14.
17. Ibid., p. 31.
18. Ibid., p. 20.
19. UAV Annual Report, FY 1996, p. 31.
20. Ibid., p. 22.
71
21. Ibid.
22. Ibid., p. 24.
23. Rear Admiral Barton Strong, Statement before Subcommittee
on Airland Force of the Senate Armed forces Services Committee,
March 29, 1996.
24. UAV Annual Report, FY 1996, p. 39.
25. Bruce D. Nordwall, “Ultra-Wideband Radar Detects Buried
Mines,” Aviation Week & Space Technology, March 31, 1997, p. 63.
26. Z. Lum, “Demo Done, UAV EW Payload Players Await Report,”
Journal of Electronic Defense, Vol. 20, January 1997, p. 27.
27. Pat Cooper, “New Battlefield Tasks Eyed for UAVs,” Army
Times, October 28, 1996, p. 12.
28. Ibid.
29. Wagner, p. 174.
30. Ibid., p. 181.
31. Ibid., p. 180.
32. W. Seth Carus, Cruise Missile Proliferation in the 1990s,
Washington, DC: Center for Strategic and International Studies,
Praeger Publishers, 1992, p. 86.
33. Doug Richardson, ARMADA International, October/November
1996, p. 20.
34. UAV Annual Report, FY 1996, p. 6.
35. Most international weapon agreements do not include UAVs,
the Missile Technology Control Regime being a noteworthy exception.
36. Carus, p. 89.
37. Defense Airborne Reconnaissance Office, UAV 1995 Annual
Report, FY 1995, August 1995, p. 8.
38. Richard T. Wagamon, Address before UV-95 Conference, Paris,
June 1995.
72
39. Wagner, p. 186.
73
CHAPTER 4
STRATEGIC LOGISTICS
FOR INTERVENTION FORCES
Yves J. Fontaine
[Editor’s Note: Lieutenant Colonel Fontaine presents
evidence of a slow learning curve when it comes to solving
logistics management problems. He points to potential near
term solutions for many existing problems, but makes clear
that many greater changes will be required throughout the
force before any revolution in military logistics can be
expected to become a reality. DVJ]
INTRODUCTION
In every overseas deployment since the SpanishAmerican War, the responsiveness of the logistics system
was degraded by lack of information concerning personnel,
equipment, and requisitions status. Moreover, an enormous
amount of materiel was shipped to the theater, but was not
readily available because of this poor information, which in
turn reduced the combat forces’ ability to accomplish their
mission. This paper analyzes the strategic logistics systems
of recent force projection operations covering the entire
spectrum of war, to include Operations DESERT
SHIELD/DESERT STORM, RESTORE HOPE, SUPPORT
HOPE, and JOINT ENDEAVOR. It identifies problems
with tracking the status of supplies, building the
Time-Phased Force Deployment Data (TPFDD), attaining
Automated Data Processing (ADP) compatibility, and
securing unity of command and control over the various
log istica l in pu ts. The p ap er c onc l ud es wi th
recommendations for logistics concepts which should
support the Army through the opening decades of the next
century.
75
HISTORICAL ANALYSIS
Operation DESERT SHIELD/DESERT STORM.
On August 2, 1990, Iraq invaded Kuwait and seized
control of the country.1 In response, the U.S. military began
deploying personnel, equipment, and supplies to seaports
and airports in Saudi Arabia.2 The brevity of the warning
time, the massive size of the coalition force, the lack of
prepositioned equipment, and the distances between the
United States and Saudi Arabia required U.S. logisticians
to mass enormous lift assets in a short period of time.3
U.S. Central Command (CENTCOM) was responsible
for theater logistics management. It developed policy and
monitored and coordinated transportation and distribution
operations. CENTCOM tasked the Army component
(ARCENT) with management of seaport and airport
operations. ARCENT also managed theater surface
transportation and distributed common items such as food,
clothing, lubricants, and munitions to all services.4
ARCENT operated the theater Communication Zone,
coordinating joint, combined, and coalition operations to
include Host Nation Support (HNS).
Because of the immediate threat from Iraq, CENTCOM
decided to deploy mobile combat units first, bringing in
logistics units later. This decision to deploy service support
units later in the deployment sequence seriously degraded
ARCENT’s ability to provide support. Initially ARCENT
had to rely heavily on HNS for the operation because U.S.
forces had limited in-country capability to move, store, and
retrieve equipment and supplies. This CENTCOM decision
also triggered instant allocation of the most available and
fastest strategic lift assets to combat units. This ultimately
resulted in an unsynchronized buildup of a theater
infrastructure. The inserted force was dangerously
unsustainable for the initial period of Operation DESERT
SHIELD because of a significant shortage of Army surface
transportation assets, including heavy equipment
76
transporters, tractor trailers, and materiel handling
equipment.5 This meant that the Army could not fulfill its
mission of providing support, thus leaving the Air Force and
Marines no choice but to establish their own transportation
systems, which further complicated matters.6
An automated data system was supposed to regulate the
massive flow of cargo and people into the theater of war, but
CENTCOM had not finalized its Saudi Arabian plan. Thus,
deployment data were not automated. Most of the
movement was managed manually, and planners
improvised the force deployment list as they executed it.
This lack of automation and midstream revisions prevented
airlift and sealift from operating at full capacity. Deploying
units often did not know where and when to meet aircraft, or
how to marry equipment with departing ships, thus causing
planes to fly empty or with low priority cargo and forcing
units’ equipment to be piecemealed on several ships.7 Such a
large operation needed a well-planned, automated guidance
system for orderly deployment.
Logisticians admitted that they were unable to track
equipment and supplies arriving in theater. They knew
when a ship was scheduled to arrive, but they had only a
general idea of the cargo. Ships had incomplete manifests
and mislabeled containers. During the initial phase of the
operation, logisticians at the ports had to empty containers
in order to determine where to ship the contents.8 Because
of the constant changes in the deployment sequence, some
equipment arrived before its unit did. Logisticians at the
ports did not have knowledge of the units’ arrival, nor did
they know their location in-country after the units had
deployed. Supplies piled up at the port, overwhelming the
supply personnel, and the proverbial iron mountain started
to rise.
Container management was nonexistent, so throughput
became impossible. The Army had no viable tracking
systems, used sloppy documentation procedures, and
lacked sufficient materiel handling equipment to move the
77
containerized cargo to appropriate distribution centers. To
assure maximum use of ship capacity, shippers filled the
containers full regardless of destination. Containers were
filled with supplies addressed to several consignees, or were
loaded with unidentifiable loads with minimum
documentation. Because the personnel needed to document
the receipt of the materiel were not deployed early, stacks of
containers piled up unprocessed in the ports. Lack of
documentation further degraded the tracking of supplies,
and 50 percent of the arriving containers had to be opened to
identify their contents. The lack of materiel-handling
equipment and transportation assets worsened the backlog.
Units lost confidence in the system and reordered “missing”
items, thereby compounding the problem.9 Finally, even
logisticians bypassed the supply system and established
direct logistics links with their home bases to obtain critical
items.
The airlift system was overloaded and could not keep up
with demands. By December 1990, 7,000 tons of cargo were
lying on the ground at Dover Air Force Base, Delaware,
awaiting shipment to Saudi Arabia. This supply remnant
exceeded the total airlift capacity sixfold.10 Units saturated
the airlift system with high priority demands because they
had lost confidence in the standard logistics system.
Because cargo and supplies were not properly prioritized,
first in/first out became the rule, and high priority items
were delayed in reaching deployed units. To partially
correct th e probl em, Tr ans p or tati on Command
(TRANSCOM) established the Desert Express and the
Desert European Express Systems to deliver critical repair
parts overnight from the United States and Europe.
Although successful, the system bypassed the established
procedures—at enormous extra cost. 11 Ingenuity, not
consistently applied logistical practices, saved the day!
Operation RESTORE HOPE, Somalia.
In April 1992, the United Nations (U.N.) Security
Council approved Resolution 751, establishing the U.N.
78
operation in Somalia (UNOSOM). Its mission was to
provide humanitarian aid and facilitate the end of
hostilities. 12 During the next 6 months, U.N. forces
delivered supplies to Somalia. However, by December 1992,
the security situation worsened, forcing the United Nations
to initiate Operation RESTORE HOPE. The United Nations
assigned the United States to lead and to provide military
forces to a multinational coalition; to secure air and naval
ports; to secure key installations and food distribution
points; and to provide security for convoys and relief. This
operation, which involved more than 38,000 troops from 21
nations, finally succeeded in providing security and food
throughout the country.13 In May 1993, the United Nations
assumed the mission to provide humanitarian support
under Operation UNOSOM II. U.S. participation was then
reduced to providing logistical support and a quick reaction
force.14
Upon initial notification, CENTCOM deployed a
humanitarian assistance survey team to assess the
situation, then activated a Joint Task Force (JTF) to
conduct emergency airlift of food and supplies into Somalia.
In December 1992, CENTCOM ordered the 1st Marine
Expeditionary Force to become the nucleus of the 20-nation
combined task force. Concurrently, CENTCOM alerted the
10th Mountain Division to prepare to serve as the
headquarters for all Army forces in Somalia and to conduct
military operations to provide security for the relief effort.15
The deployment of forces and equipment to Somalia
encountered problems similar to those in operation
DESERT SHIELD/DESERT STORM. During the planning
phase, the 10th Mountain Division had to contact four
different headquarters to determine deployed force
strengths. Strategic planners had developed plans for the
operation but sought little input from the tactical units.
This caused significant problems since the strategic
planners did not anticipate the large number of logistics
personnel required to support a bare base logistics
operation.16 Transportation problem solvers did not deploy
79
early enough to detect on a timely basis the terminal and
port problems stemming from absence of a host country
infrastructure. Without this on-site expertise, major
problems were inevitable.
The 10th Mountain Division deployed to Somalia
expecting to provide self-contained logistics, but it was
ill-equipped to overcome the logistical nightmare it
encountered. The unit was not prepared to handle
problems associated with downloading prepositioned ships
and operating sea and air ports of debarkation. The rapid
arrival of Army combat units soon overwhelmed the initial
support capability provided by the Marine Corps Force
Service Support Group; 10th Mountain Division logistics
units had to be consolidated to perform wholesale logistics
functions.17
There was no preexisting plan for Somalia, and the
deliberate planning process failed as the TPFDD
continuously changed. 18 The CENTCOM-developed
TPFDD was valid for only a few days at a time as
subordinate units made changes on the ground without
coordination. Loaded cargo never left the port of
debarkation or had to be unloaded at another port because it
was no longer needed. Likewise, airlift was sent to carry
cargo that never appeared.19
The lack of automation interface caused significant
problems in tracking. Unforecasted cargo, inaccurate data,
and differences between codes used by deploying units were
as prevalent as in DESERT SHIELD/DESERT STORM.
The lack of interface between Joint Operations Planning
and Execution Systems (JOPES) and the military standard
transportation and movement procedures resulted in a loss
of materiel tracking, tracing, and status awareness. So once
again, items could be found only after physical checks were
made. 20 At one time the Army was sending excess
equipment back to the United States while the Marines
were requesting augmentation of the same equipment.21
80
Six separate supply support systems were used in the
Somali theater. Units used the standard Unit Level
Logistics System to request supplies; requisitions were
transferred through the Direct Support Unit to the Defense
Automated Addressing System for routing into the National
Inventory Control Point (NICP); units also used direct
requests such as E-mail and phone to home station; in
desperation, units called directly to depots and NICPs to
shorten order and shipping time. The wholesale level
honored the system, but tracking was difficult. At times,
units used the U.N. system to obtain common use items, but
the system was slow, quality was uncertain, and delivery
was erratic. Action officers and general officers also made
direct requests, triggering movements of supplies without
the knowledge of logistics personnel in the theater. Finally,
Army Materiel Command established a back-up system
using logistics representatives to obtain supplies. These
systems got the job done, but the logistics ADP
infrastructure did not work.22 The lack of a theater level
supply command to discipline the supply system led to
waste, and the iron mountains started to appear on the
horizon again.
Operation SUPPORT HOPE, Rwanda.
On July 4, 1994, Kigali, the capital of Rwanda, fell to the
Tutsi dominated Rwandan Patriotic Front. Thousands of
Hutus, fearful of genocide, fled to Zaire or French safe zones
in south Rwanda and Burundi. Most fled to Goma, Zaire,
which exploded into a refugee camp of one million refugees.
Soon humanitarian organizations were overwhelmed by the
need for food, medical assistance, and clean water.23 By July
24th, U.S. military personnel deployed to Kigali, Goma, and
Entebbe, Uganda, to establish the infrastructure for
humanitarian support. Civilian Military Operation Centers
were established immediately in Goma and Kigali to
synchronize support requirements with the NonGovernment Organizations (NGO). U.S. policy at this time
was to assist the humanitarian effort, take no casualties,
81
and leave. The United States subordinated its logistics
effort to U.N. control.24 The primary U.S. mission was to
provide clean water and then to collect and distribute food
and other necessities.
Upon notification of the crisis, the U.S. European
Command (USEUCOM) JTF deployed a survey team to
provide on-the-scene assessment of the situation.25 This
early assessment was vital in determining the composition
and flow of follow-on forces to accomplish the mission.
However, the JTF commander found it very hard to
influence the deployment of forces once requirements
became more clear. The deployment was managed by phone,
which resulted in inefficient use of airlift. The JTF
commander lacked the ability to enter the JOPES system in
order to build his force. Present procedures call for the
TPFDD to be built by unified commands, but in
nonstandard contingency operations, each of which
presents its own unique problems, the commander should
have the authority to reach deep into unit structures and
call upon the capabilities required to accomplish the
mission following his assessment of the situation.26 That is
to say, he should be able to tailor his forces to fit the unique
circumstances of his mission. This requires the Army to
review how it structures forces and builds TPFDDs.
As in Operations DESERT SHIELD/DESERT STORM
and RESTORE HOPE, several commands and agencies
were involved in TPFDD input, creating problems in
synchronization. As the JTF Forward was trying to pull
units it needed for the mission, the JTF Rear and supporting
commands were pushing units to the theater based on the
previously established TPFDD. Additionally, and peculiar
to this operation, international relief and NGO
requirements were added on top of an already confusing
TPFDD without consideration of timing or flow. This
resulted in a backlog at ports of embarkation, unnecessary
movement delays, and a loss in status awareness. Finally,
the JTF gained control of the movement and circumvented
82
the broken system by resorting to teleconferences and daily
airlift messages.27
T h e Materia l M anagement Center and the
Arrival/Departure Airfield Control Group were bumped by
higher priority units and did not arrive in theater until
C+21. Prior to their arrival, no structure was in place to
maintain accurate status information on supplies and
equipment.28 Personnel did not use the proper cargo
documentation and manifesting procedures, which resulted
in the loss of transit status information once again. These
problems forced the JTF commander to allocate personnel
to the aerial port of debarkation to meet each aircraft,
identify the cargo, break it out, and get it to the proper
place.29
The JTF also encountered problems in ADP. It had no
capability to track individual loads precisely or forecast
arrivals because of an interface problem between the Global
Decision Support System (GDSS) and JOPES. The interface
works only when the GDSS data is loaded into the JOPES in
a timely and correct manner. Headquarters Air Mobility
Command was responsible to load GDSS into JOPES, but
poor quality input caused problems. The Army needs a link
to interconnect strategic airlift, the JTF, and the
customers.30 During Operation SUPPORT HOPE, the
Standard Army Automated Requisition System was
introduced early, but proved unable to transmit
requisitions for several days because of delays in
establishing communications.31
Operation JOINT ENDEAVOR, Bosnia.
Operation JOINT ENDEAVOR offers yet another
example of flawed logistics planning. The Dayton
agreement (December 1995) led to a general accord for
peace among warring parties in Bosnia. The mission to
implement the peace agreement fell to the North Atlantic
Treaty Organization (NATO). The United States committed
the 1st Armored Division to NATO’s Allied Ready Reaction
83
Corps (ARRC) for the operation. The United States also
provided augmentation to the ARRC headquarters and a
National Support Element in Hungary and Croatia.32
Strategic ambiguity plagued the operation from the
start. It was not clear until the actual signing of the peace
agreement what type of force package was needed to
accomplish the mission. At the conclusion of the planning
phase, the TF commander’s plan called for a deliberate,
balanced deployment so he could tailor his forces in-country.
The force package would augment the V Corps National
Support Element in establishing the intermediate staging
base in Hungary. The TF would then insert engineers and
combat forces to establish lines of communication into
Bosnia. The JOINT ENDEAVOR organization anticipated
a single U.S. division organized with multiple brigades,
numerous corps level support units directly under division
control, and U.S. Army Europe (USAREUR) forward as the
National Support Element. However, the final peace
agreement called for the immediate entry of a sizable
combat force into Bosnia. This altered the deployment
packages and delayed deployment of combat service support
assets, desynchronizing the deployment plan. 33
Once again, the decision to deploy combat forces at the
cost of logistics forces affected the sustainment of these
same forces in country. USEUCOM enlisted the Logistics
Civil Augmentation Program (LOGCAP), so civilian
contractors would build the forward logistics bases as forces
arrived in the area. LOGCAP’s requirements for movement
of supplies conflicted with requirements to move the combat
forces. Lift for the combat forces was accorded a higher
priority, causing a shortage in logistics support. Once again
we had inserted an unsustainable force. Unit deployments
had to be delayed or diverted until bases were established.
The Task Force arrived without its main support and repair
parts stocks. Had the TF been required to undertake combat
operations, it would have found its combat power severely
constrained.33
84
Several deployment management systems designed to
assist in deploying the force were either overlooked or
inefficiently used. The failure to use the Transportation
C oordin ator A u tomated Command and Contr ol
Information System, which automates the input of unit
movement data and generates deployment equipment lists
for loading in the JOPES system via the computerized
movement planning and status system, prevented JOPES
from automating construction of the TPFDD and
contributed to the inability to maintain accessible
information on the composition of the projected force.35
Operation JOINT ENDEAVOR benefited from ADP
technological improvements identified as necessary in past
contingency operations. In this operation, logisticians
sought to achieve Total Asset Visibility by tracking the
location, condition, and consignee of supplies and
equipment from the factory to the foxhole. Logisticians
planned to use radio frequency tags, detection devices, and
computer systems to track the movement of items through
the entire distribution system. 36 Even though Radio
Frequency (RF) tags were used to maintain visibility over
equipment throughout the deployment, these tags did not
sustain visibility as planned. Only one station was set up to
load the RF tags with the data needed for tracking of
containers and supplies, and it could not handle the large
quantity of containers being tagged. Next, “interrogator”
hardware was not established at all major intersections
along the Lines of Communication, thus preventing
logisticians from tracking RF tagged items. Third, the
Automated Manifest System (AMS), used by the direct
support units to improve accuracy and expedite processing,
did not arrive in country until late in the deployment;
therefore, containers received prior to their unit’s arrival
were not processed correctly. Once operational, the AMS
was able to track and distribute supplies.37
In summary, the U.S. Army encountered the same
problems in deploying and maintaining visibility of
85
personnel, equipment, and supplies in support of four recent
contingency operations.
WHAT IS TO BE DONE?
We have unquestionably identified the problems, now
can we fix them? If we are going to provide the 2025 force
adequate logistical support, we need to make critical
changes in four areas: force structure, ADP improvement,
C3, and technology.
It is a given that, regardless of the type of operation,
combat forces will always deploy first at the expense of
combat services support (CSS) forces. The TPFDD will
always change, and human errors will always play havoc
with deployment documentation and manifests. We must
anticipate these realities and change the way we look at the
CSS force structure. We need a CSS force based on a
modular system. We must build logistics modules tailored
to perform specific functions. We should develop such
modules to serve as receiving units at aerial ports of
debarkation or as seaport unloading units, armed with the
technology to perform these functions. The unit should be
able to talk directly to the national provider and to the JTF
commander to obtain follow-on support and to keep the
commander aware of the support situation. These modules
must deploy as part of the combat forces. This approach
to force structure is not new. USEUCOM attempted to use
this approach during the initial deployment for operation
JOINT ENDEAVOR. The CSS community must refine its
structure and build units in accordance with the functions
they must accomplish, while keeping them small but
technologically updated.
The modular system allows for flexiblility and the
capability to move modules within the TPFDD once on the
ground. The system must allow the TPFDD to evolve from
the present system to a more agile system ready to respond
to changes in the fast-paced situation.
86
The commander’s ability to manipulate the TPFDD is
directly linked to the level of ADP support he will receive. By
2025, ADP improvements must enable commanders to
obtain and maintain visibility of all assets at all times. This
will provide commanders the ability to influence not only
the movement and deployment of initial entry forces, but
also to influence logistics flow throughout the operation.
The Joint Total Asset Visibility (JTAV) program, built in
response to the growing importance of TAV to a
restructured Defense Logistics System, has developed an
implementation plan that integrates TAV throughout the
Department of Defense. The objective of JTAV is to develop
a responsive, user-friendly system, easily understood by all
and capable of rapid deployment to contingency areas.
CINCs and JTF commanders will use the system to enhance
the planning, deployment, and movement of forces and to
respond to changing strategic guidance. The system will
enable logisticians to track orders, shipping activities, and
port operations throughout the supply system; it will give
strategic level materiel managers visibility of all assets
throughout all systems.38
The JTAV implementation plan synchronizes four
national systems to accomplish TAV. The Logistics
Information Processing System (LIPS) will serve as DOD’s
central repository for requisitions status. The Inventory
Control Point Automated Information System will be the
permanent data repository for information on all
ICP-managed assets from retail to wholesale levels. The
Global Transportation Network (GTN), developed by
TRANSCOM, will provide visibility of unit and nonunit
shipment data (personnel, equipment, and supplies) to
include information on medical patients. Finally, the JTAV
will develop the Joint Theater Logistics Automated
Information System to provide visibility of the location and
status of in-theater logistics assets.39 JTAV plans to use a
client server architecture consisting of a server/database
manager, a network manager, and a communications
manager. It will develop a deployable JTAV package in
87
conjunction with the CINCs to support activities equivalent
to an Army Corps, Marine Expeditionary Force, Navy Fleet
Headquarters, or numbered Air Force. Deployed units will
be able to access JTAV with existing military applications.40
The JTF staff will be able to access supplies in transit and in
storage. It will process information from CONUS through
the links with LIPS and GTN and merge this information
with the information received from in-theater logistics
modules, thereby giving the JTF commander the status on
all his assets and the capability to manipulate logistics to
meet mission requirements.
The JTAV modernization system not only allows
logisticians to obtain and maintain visibility of all
personnel, equipment, and supplies in the system but also
to modify the logistics request system significantly. Since
managers will have visibility of supplies at all times and
have the ability to change the flow of supplies at a moment’s
notice, there will be no need for the existing priority system
and the large stockpiles of supplies. The new ADP system
gives the logisticians the opportunity to streamline logistics
into a more flexible and responsive system.
The ability to control agile CSS modules on the
battlefield and to harness the power of the revolution in
information technology brings to light the need for a
centralized logistics command and control system.
Command structures, such as a JTF, should contain a
logistics commander with the necessary ADP and trained
personnel to monitor all logistics assets in the theater of
operations. The logistics commander should deploy early to
assess the situation and take immediate strategic level
action concerning movement of personnel and equipment
(both military and civilian) to respond to mission changes.
The JTAV ADP system, previously discussed, would give
the JTF logistics commander the ability to modify the
TPFDD as soon as he is on the ground, plus the ability to
maintain visibility of personnel, equipment, and supplies
shipped to the area of operations. However, although
technology will give logisticians the ability to know where
88
the assets are at all times, it likewise demands stronger
restrictions on the manipulation of the system. Given the
new JTAV capability, a JTF logistics commander must
establish strict guidelines on who can input changes to the
deployment of forces and who monitors the arrival and
transfer of logistics assets. Such real-time, on-site control
and authority over logistics is revolutionary but absolutely
essential. In the past, the logistics tail could unfortunately
wag the JTF dog. Now that big dog will wag his tail any time,
any way he sees fit!
Finally, ADP improvements are a subset of the
revolution in information technology. They allow
logisticians to improve logistics systems during contingency
operations. Nevertheless, the level of technology available
today (and probably in 2025) does not significantly change
the way we do business as logisticians. Current technology
allows improvement of logistics systems by giving total
visibility of all assets and by enabling faster processing of
information, but it does not yet alleviate the need for the
extensive quantity of logistics to support U.S. deployments
throughout the spectrum of war.
ONE OBSTACLE REMAINS
Careful analysis of the primary logistics requirements in
a conflict reveal, as always, the critical need for fuel,
ammunition, and food as the most significant logistics
requirements for any force deployment. Consequently, the
revolution in information technology does not mean a
massive decrease in the U.S. Army logistics tail. Prior to a
significant change in logistics or implementation of a
genuine logistics revolution, the U.S. Army must undergo a
deeper technological revolution and develop radically new
systems, such as tanks that do not use conventional fuels
and ammunition. In other words, the U.S. Army must
develop systems that require very little or no logistics tail.
The U.S. services need to increase budget share allocated to
Research and Development (R&D) on behalf of such
systems, even at the cost of force structure. Once these
89
systems are identified, all services must join in procuring
and using common versions to the maximum extent
feasible, rather than each service designing, developing,
and deploying its unique version. The result will be a simple
logistics system, a small logistics tail, and a lethal but
smaller and supportable contingency force.
CONCLUSION
This study has identified key logistics problems that
occurred during recent contingency operations. Problems in
materiel visibility, building and managing the TPFDD,
ADP compatibility, and command and control hampered
logistical support to varying degrees in each operation.
Logisticians are aware of these issues and have taken steps
to resolve them by developing and implementing the JTAV
plan. On a more fundamental level, we need to build a
centralized and permanent command and control system
that includes a logistics commander and a logistics force
composed of tailored logistics modules. This new capability
would enable logisticians to take full advantage of the JTAV
plan. These steps capitalize on the revolution in information
technology; they will certainly improve today’s logistics
systems.
What these improvements will not do is create the
revolution in military logistics that is needed by 2025. The
real revolution in military logistics will occur only after our
research community provides us with revolutionized
combat equipment that minimizes the logistics tail needed
to support it. The Army leadership must realize the need for
new equipment and allocate the necessary resources to
develop it.
ENDNOTES - CHAPTER 4
1. Scott W. Conrad, Moving the Force, Desert Storm and Beyond,
McNair Paper No. 32, Washington: National Defense University Press,
December 1994, p. 13.
90
2. U.S. Congress, Senate, Subcommittee on Oversight of
Government Management, Committee on Governmental Affairs, Desert
Storm Transportation and Distribution of Equipment and Supplies in
Southwest Asia, General Accounting Office Report, 1991, p. 1.
3. Scott, p. 3.
4. General Accounting Office, p. 1.
5. Scott, p. 28.
6. General Accounting Office, p. 4.
7. Scott, p. 25.
8. General Accounting Office, p. 7.
9. Scott, p. 36.
10. Ibid., p. 26.
11. U.S. Congress, Senate, Desert Shield/Storm Air Mobility
Command’s Achievement and Lessons for the Future, General
Accounting Office Report, 1993, p. 27.
12. Kenneth C. Allard, Somalia Operations: Lessons Learned,
Washington: National Defense University Press, 1995, p. 14.
13. Ibid., p. 16.
14. Ibid., p. 18.
15. Ibid., p. 3.
16. David T. Stahl and S. L. Arnold, “A Power Projection Army in
Operations Other Than War,” Parameters, Vol. XXIII, No.4, Winter
1993-1994, p. 11.
17. Jeanette K. Edmunds, “Organizing Logistics for Peace and War:
The Necessity of a Trained Joint Logistics Support Command
Headquarters,” in Essays On Strategy, Vol. XIII, Washington: National
Defense University Press, 1996, p. 235.
18. David B. Kassing, Transporting the Army for Operation
RESTORE HOPE, Santa Monica, CA: RAND, 1994, p. xii.
19. Ibid., p. 13.
91
20. Allard, p. 46.
21. Ibid., p. 47.
22. Department of the Army, UNOSOM II Lessons Learned, Fort
Leavenworth: Center for Army Lessons Learned, 1996, p. II-10-21.
23. Edmunds, p. 139.
24. Ibid., p. 140.
25. Headquarters U.S. European Command, Operation SUPPORT
HOPE, 1994 After Action Review, 1995, p. 2.
26. Ibid., p. 34.
27. Ibid., p. 14-4.
28. Ibid., p. 8-4.
29. Ibid., p. 8-5.
30. Ibid., p. 14-9.
31. Ibid., p. 8-2.
32. Department of the Army, Operation JOINT ENDEAVOR Task
Force Eagle Initial Operations, Fort Leavenworth, KS, U.S. Army
Training and Doctrine Command, Center for Army Lessons Learned,
May 1996, p. ix.
33. Ibid., p. 9.
34. Ibid., p. 5.
35. Ibid., p. 13.
36. Ibid., p. 163.
37. Ibid., p. 164.
38. U.S. Department of Defense, Defense Total Asset Visibility
Implementation Plan, Washington, November 1995, p. 1-5.
39. Ibid., p. 2-3.
40. Ibid., p. 6-4.
92
CHAPTER 5
LOGISTIC SUPPORT
TO THE ARMY AFTER NEXT WARFIGHTERS:
A TIME FOR FUNDAMENTAL CHANGE
Gary J. Motsek
PROLOGUE
Captain Mike Thomas did a quick check of his info
screens. He had just ordered his battle team to disengage
from contact with the foe. With dominant battlefield
awareness, he knew the Joint Task Force J-3 could keep
“eyes” on the enemy and redirect other teams to swarm in and
engage them according to the plan. His group of seven mobile
assault vehicles (each with a two-man crew operating
ground and air defense weapon systems) was in pretty good
shape. Nobody killed or injured, the bio-monitors on his
people showed him that. Fuel and ammunition, according to
the readouts, were low, and two vehicles had significant
damage. Imbedded onboard diagnostics were performing
the required emergency repairs, and both could still move
under their own power. If either failed completely, the
support scavenger team would retrieve the vehicle and crew.
Those same systems had already transmitted back to the
loggies which locally replaceable units had failed and
ordered the replacements needed to bring the vehicles to full
capability. Thomas verbally instructed his display to show
his next refit/rearm location. As expected, nothing was there
yet. Large logistic points were just too tempting a target for
the enemy. Nonetheless, Mike saw on his screen the icons of
the support elements rapidly converging to the point
designated for his team and the several other points for his
counterpart teams. Clearly, they would be up and running by
the time he gave the command to sortie his folks to the
location. The team would receive its critical materiel and
93
repairs, and then, just as quickly, the logistic elements
would disperse. Both combat and support forces constantly
worked to stay “demassed” until absolutely necessary.
Momentarily, his thoughts wandered to the historical study
he had read of the revolutionary way warfare changed in the
20 years between the 20th century world wars. The 25 years
following Operation DESERT STORM brought their own
changes as well, especially in support. Heck, the sergeant
major still talks about the old “sneaker net Army” and
transporting floppy disks of supply data around the
battlefield to get a repair part or a round of ammunition.
You’ve got to wonder how they ever won a war.
INTRODUCTION
How will logisticians support the battles of the future?
Do the techniques and procedures of today have to be
fundamentally altered? Why?
It is generally accepted that we are in a period of
profound change for the U.S. military. The degree of this
tran sforma tion is unc er tai n, and ther e i s wi d e
disagreement whether the change will be evolutionary and
incremental or truly revolutionary and radical. The fact is
that the technology of the world, and information
technology in particular, is advancing at a profound rate
which virtually assures change for the military. Joint Vision
2010, issued in order to shape and focus the near future,
acknowledges the emerging importance of information
superiority.1 The Army, through Force XXI initiatives and
Army Vision 2010, has articulated a similar picture of
leveraging technology to gain information dominance and
superiority directed to the same ends.2 In fact, the Army is
already extending the institutional long range vision
beyond the year 2010 horizon to the 2025 timeframe under
the aegis of the Army After Next (AAN) effort. The AAN
guidance issued by the Army Chief of Staff is clear—narrow
the gap between heavy and light forces, improve mobility,
enhance firepower, and, finally, revolutionize logistical
concepts.3 As the Army Deputy Chief of Staff puts it bluntly,
94
“Without an RML [Revolution in Military Logistics], there
will be no RMA [revolution in military affairs] or AAN.”4
New technologies must provide agility, support force
projection, reduce excess demand and waste, and be
tailorable to requirements. Only with profound, indeed
revolutionary, changes can we lessen the logistics tail.
Without advances in logistics, an RMA for U.S. forces, and
for the Army in particular, is not possible.5
Why is the commitment to RMA in logistics critical
today? Why is the close of the 1990s an important decision
point? To put it simply,
as we move beyond 2010, most of the major weapon systems
supporting Force XXI will be approaching the end of their life
cycle. The Army will be faced with the decision to either
continue investing in incremental improvements in existing
platforms which could extend their usefulness to about 2025,
or taking the steps required to replace these aging weapon
systems with totally new systems designed to take advantage
of the technological advances which have occurred over the
years.
Force XXI, an incremental step along the way, is not the
RMA. It was initially envisioned to be a rapidly tailorable,
rapidly expandable, and strategically deployable force
capable of supporting the two major regional conflict (MRC)
construct. A key goal was to make these forces lighter
without sacrificing lethality and survivability, but it is
extraordinarily difficult to change the nature of warfighting
radically while retaining existing equipment.7 The 70 ton,
M-1 series tank, with all its strengths and limitations, will
remain through the early 21st century without regard to
informational technology appliques. Force XXI divisions
will see little organizational change since the major existing
systems will still be in place. Important possible exceptions
are the Commanche helicopter and perhaps the Crusader.
New technology may raise the cost to the point at which the
nation can afford only a small high-tech force which will
have difficulty with asymmetric responses.8
95
The Army must be able to perform successfully in a force
projection role deploying primarily from the continental
United States (CONUS). This drives considerations for
major weapon and support systems.
Technology is changing at an exponential rate. The Force XXI
systems may not be the world’s leading warfighting systems if
we do not improve them over time. Technology growth will
require organization changes in both the assets and business
practices used. This march of technology will result in the need
for spending more time and money to keep ourselves and
products current.
If we retain the existing systems, only marginal
improvements are possible. The Division XXI Tables of
Organization and Equipment show no important changes in
th e Div ision Su pp or t Command other than the
consolidation of maintenance resources from the maneuver
brigades. The primary weapon systems remain the same,
the logistical burden remains essentially constant. As the
Air Force demonstrated with the C-17, one must specifically
design the new platform with reduced support, but
streamlined C-17 support procedures cannot be applied
backward to the existing C-5 fleet. Likewise, unless the
probability of hit and kill per round from a given weapon
system markedly improves, logisticians still need to provide
the warfighter with essentially the same number of rounds
as today. Improving probability of kill from 77 to 80 percent
has only a marginal effect on the support structure, which
measures resupply in terms of truckloads.
If the way the land force maneuvers, moves, and fights
changes because of profound improvements in the
capabilities of their platforms, the logistical tail can and
must be changed as well. A logistician that cannot keep up
or see the friendly forces, cannot adequately support. If the
combat platforms dramatically increase in speed and
maneuver, support vehicles must have a commensurate
improvement. The two systems are inextricably linked.
96
THE NEAR FUTURE PICTURE
In the broadest terms, Joint Vision 2010 considers
focused logistics as one of the four key operational concepts.
Army Vision 2010 complements this with a pattern of
operation entitled “Sustain the Force,” one of five key
patterns listed in the document. The Force XXI effort
establishes the framework and environment for the Army
Strategic Logistics Plan which in turn provides focus to
synchronize Army logistics support for this near future
force.10 The Army Strategic Logistics Plan postulates
profound re-engineering and redesign of the logistics
community and possibly profound cultural changes as well.
This radical approach is not reflected within existing Force
XXI force documents, which is based rather upon a level of
iterative change and leveraging of some technology
enablers along the way to a more radical future.
When Joint Vision 2010 is largely realized, the battlefield of the past will be largely replaced by a nonlinear
battlespace. 11 U.S. forces, through information and
technological innovations, will have achieved dominant
maneuver, increased ability for precision engagement, more
control of the battlespace through full dimensional
protection, and some measure of focused logistics.
What happens to logistics with this near future force?
The vision documents perceive:
the fusion of information, logistics, and transportation
technologies to provide rapid crisis response, to track and shift
assets even while enroute, and to deliver tailored logistics
packages and sustainment directly at the strategic,
operational, and tactical level of operations.12
Yet, additional technological enhancement is the key to
achieving logistical improvements in this timeframe, since
the force will still be utilizing today’s support systems
(wheeled trucks, palletized loading system, rotary and fixed
wing aircraft). Clearly, reducing the size of theater stocks,
the iron mountains of the past, will make the logistical tail
97
of the fighting force smaller and more agile. Logistics are
more predictive, responsive, and visible to the operators and
those supported; large, brute-force push packages have
been largely supplanted by smaller, rapidly moving pull
packages; the past practice of physically stockpiling 30 days
or more of supplies in theater for everything the warfighter
believed he needed are gone. On-ground stockpiles of
critical items are measured in terms of 2, 3, or 5 days of
supply. The goal is affordable and responsive support that is
modular and thus tailorable to mission requirements.
The 2010 logisticians should enjoy a mature capability of
total asset visibility (TAV) for materiel and personnel.
Through the interconnection of new and legacy information
and management systems, a worldwide asset picture should
be available. However, some of those same legacy systems
will inevitably inhibit complete real-time access and
operation. The Global Combat Support System (GCSS), the
logistical component of the Global Command and Control
System (GCCS), has established the common information/
communication technology environment. Until all
subsystems are compliant and interactive, logisticians will
be constrained by some aged information. Despite these
limitations, the supported warfighter should see a
dramatically improved snapshot of all resources allocated to
him. The resources no longer need to be physically in the
theater. Admittedly, this is the military equivalent of
commercial “just in time” delivery, a profound cultural
change for a warfighter. It can result in a controlled supply
rate, established by the warfighter, for all classes of supply
wherein resources are allocated strictly for the mission at
hand—with confidence that the follow-on mission will be
preceded by follow-on supplies. In other words, you get only
what you need, not what you want.
Velocity Management should be the accepted doctrine of
the time. It posits a responsive transportation system to
further reduce in-place stockpile requirements. The
capability of a “FEDEX style” package delivery is available
98
for rapid delivery of low density, high value, and critical
items wherever needed.
“Stovepipe” logistics have been significantly reduced
with increased reliance and compliance of the GCSS
environment. The captains trained in the late 1990s at a
common logistics advanced course will now be the colonels
in command of multi-functional units which are modular
and capable of reconfiguration based upon mission
requirements. These colonels’ most important function is to
serve as Battle Command Logisticians who command the
logistics elements and provide all of the tactical warfighting
support. Logistical command layers have been reduced, and
nonvalue-added accounting and management steps largely
eliminated. The multi-functional elements have direct
access to national logistical information, can fix by
replacement or evacuation, and handle all resupply
coordination.13
Although the United States should enjoy dominant
battlefield awareness, there is a recognition that centers of
gravity and critical points need to be reduced. For
logisticians, this will provide additional incentive to avoid
large static piles of materiel within the battlespace. Tactical
and operational logisticians will “reach back” as far as
necessary, even to the CONUS base, to fulfill requirements
while keeping the battlespace logistical footprint small.
Although not consolidated, there will be increased
cooperation among the logistical components of the services,
the Defense Logistics Agency, and private industry.
Common application of electronic management and
information systems will create linkages from factory to
foxhole, with the civil sector assuming more responsibility
for warehousing, maintenance, and materiel management
at one end of the pipeline and the Logistic Civil
Augmentation Program (LOGCAP) at the other.14 The
Army will still have both Table of Organization and
Equipment (TO&E) and Table of Distribution and
Allowances (TDA) units within the logistics structure,
99
although they will be composed of smaller modular units
that, at the appropriate level, are capable of task
organization.
Finally, it should be recognized that there are at least
two tiers of forces within the Army. Clearly, the Army
cannot equip the full force with the digital technology
presently being evaluated by the experimental force
(EXFOR) of the 4th Infantry Division. A corps, perhaps two
at the maximum, will be equipped with the necessary
appliques and provided the additional resources, such as
improved communications, to meet the desired capabilities
of Force XXI and Army Vision 2010. Logisticians will likely
be expected to support two tiers of active combat forces and
additional tiers in the reserve structure.
In summary, logistics in 2025 will have changed. Instead
of forward deployed resources, the bulk of stocks will be
CONUS based. The focus is no longer the North Atlantic
Treaty Organization (NATO) environment of Europe, but
one of rapid response to a variety of locations and multiple
missions. Massive in-place stockpiles are largely
supplanted by a responsive, high velocity transportation
system. Asset visibility has been markedly improved.15
Finally, although joint operations are the norm, the
individual services’ Title 10 responsibilities, which include
sustainment of the force, remain fundamentally unchanged
a lth ou g h in creas i ngl y c hal l enged by other DoD
organizations, such as the Defense Logistics Agency and the
Department of Defense Information Systems Agency, which
push inexorably towards consolidation.
THE FUTURE OF ARMY AFTER NEXT (AAN)
Given that Force XXI and Army Vision 2010 provide the
template for the interim force that is largely composed of
existing platforms, some predictions can be made of the
AAN future, where those same platforms finally have been
replaced. The specific year of the future, 2020, 2025, or
whatever, is not as critical as acceptance of the assumption
100
that new systems will continue to build upon and further
develop the trends of the interim force. For example, one can
reasonably assume that information and communication
technologies will continue to develop to improve our ability
to see the battlefield in real time and that larger and larger
volumes of data will be handled as a matter of course.
Similarly, if we intend to further develop the enablers of
Army Vision 2010, the M-1 tank replacement will likely be
lighter (to enhance strategic mobility and power projection),
multi-capable (possessing ground and air attack
capability?), and equipped with integral and embedded
technologies that could only be crudely replicated by the
appliques of the past. One need only consider the embedded
computer and diagnostic capability of a 1997 commercial
automobile as compared with a car of 25 years ago to
visualize the possible technology jump. On-board systems
will monitor performance and consumption rates, predict
and diagnose potential and real failures (at 99+ percent
accuracy), and digitally link to the supporting logisticians.
Decreased consumption rates for the two largest classes of
supply, III (fuel), and V (ammunition) should further
diminish the logistical footprint. Vehicle energy costs could
be reduced by as much as 50 percent. Through the use of
new materials ammunition packaging could have 30
percent less weight and volume.16 Line unit replacement of
failed components can be performed on many sub-systems
by the operator crew without technician intervention.
What appears to be generally consistent among the AAN
fighting concepts is that the battle force will have radically
increased mobility, and will have all combat operating
systems organic to it.17 Some combat organizations will
strategically deploy directly from CONUS. This suggests an
ability to transition directly from the strategic movement to
combat without pause. Forces will be increasingly joint in
character and composition, single service operations being
an exception to the rule. The command and control
structure will become even flatter, cellular rather than
hierarchical, with fewer levels of intermediate command.18
101
Operational orders and schemes of maneuver will be
transmitted immediately to all subordinate commanders
from the primary planner.
Technology will continue to improve battlefield
awareness. Although the United States is likely to maintain
dominance, the technologies associated with this awareness
are increasingly available on the commercial market for use
by potential enemies. Even rogue nations and their warriors
will have access to cheap satellite imaging and pinpoint
navigation systems.19 This further increases the need for
friendly forces to avoid presenting centers of gravity or
critical points. To stay massed invites attack. Therefore,
forces will have developed a swarming scheme of maneuver.
Combat forces remain demassed in numerous small
elements and, when directed, mass to concentrate
overwhelming power for short periods of time. Upon order,
they again demass. This cycle of sorties continues until the
enemy is defeated. Because of dominant battlefield
awareness, contact does not have to be maintained to fix the
enemy. It provides the ground force commanders their
picture of the battlespace much the same way the present
Airborne Warning and Control System (AWACS) provides
the Air Force a full picture of its operational space. Because
of this knowledge of the enemies’ location, friendly forces
may sortie in and out of the immediate battlespace. The
concepts of dominant maneuver and precision engagement
become complementary.20 Ground forces of tomorrow could
maneuver to position advantage the same way a combat
aircraft is directed towards the target area by AWACS
controllers today, then strike from that location with
precision and immediately leave the area.
This constant massing and demassing of forces is
possible only with the maturation of the operational
concepts of Joint Vision 2010 and the necessary technology.
It suggests that the bulk of critical logistical support (fix,
fuel, arm) are provided during those times when the battle
force is demassed. It suggests that logistical support forces
will have many of the characteristics of the battle forces.
102
Just as the combat forces mass only when required, the
logistical elements will do likewise and form support
locations only as required, quickly diffusing when the
immediate support mission is accomplished. The joint task
force J-3 and J-4 will have to work current operations in
close coordination and harmonization. Logisticians within
the battlespace will have to become experts in maneuver.
The movements and massing/demassing of the combat and
logistical forces must be carefully synchronized to assure
success.
Within the battlespace, the logistician’s main protection
is the same battlefield awareness enjoyed by his combat
compatriot. The combat team leaders and their supporting
logisticians must see and work with a common battlefield
picture, common planning tools, and common predictive
models. A key capability of the vehicles supporting the
battle force must be equality in range and speed. The
envisioned battlespace is not linear, meaning that
logisticians must quickly maneuver to meet the combat
forces in temporary relatively safe spaces scattered around
the area of operation.
Fixed and slow-moving targets will fare poorly on tomorrow’s
battlefield. Any object with a fixed latitude and longitude can
be targeted (with low-cost, highly accurate aiming systems)
and struck. These weapons will use a combination of improved
gyroscopes and accelerometers, navigational devices, global
position system (GPS) satellites, and local positioning signals
from pre-positioned emitters.21
Additionally, speed provides protection in itself and
offsets the lack of other forms of protection by limiting
exposure in dangerous areas. To provide the logistic
vehicles with heavy protection approximating the fighting
force would necessarily limit their load capacity. Every
pound of armor is one less pound of support materiel. This
tradeoff, again, is not unlike the support arms of the sister
services, which do not heavily armor tankers (air or sea) or
supply ships. The support ships (or aircraft) rapidly move in
103
and then move out, their speed and short time exposure
being their primary protection.
Outside the immediate battle area in relatively safer
zones, logisticians may operate mobile bases that provide
more extensive support. This could include prepositioned
afloat intermediate support bases consisting of ships
designed for a support function, which is a logical extension
of the present Marine Corps concept of ship-based logistics.
Combat forces could move to these safe areas and obtain
resupplies fabricated from raw materials, as well as
availing themselves of creature comfort supply and
services. Combat systems would have major battle damage
repaired and components with a predicted failure replaced.
The battlespace logisticians reach back to these bases for
their resupply.
“Procurement agility” becomes a strategic matter, and
national resources, because there is total visibility of assets
and capability, can be leveraged to support the battle
directly.22 Requirements may be placed directly on the
industrial base with a “just in time” delivery directly to the
battlespace. In fact, this principle is implemented today
with Class VIII medical materiel requirements sent directly
from the commercial supplier to the user. We will need a
cultural shift from unit ownership of resources to national
ownership, though the unit will require the discipline of
management responsibility. Although located in a specific
location, unit resources are part of the national “virtual
warehouse” under consolidated materiel management.
Thus with an integrated distribution system (with mature
Velocity Management), an item in unit stockage, such as an
Army standard load (ASL) or basic load (or their AAN
equivalents), will be available for a contingency across the
world if not specifically authorized retention due to an
authorized higher priority.
Who controls logistic support and these priorities of
materiel in behalf of the warfighter? As envisioned, only
those supporters operating directly in the battlespace are
104
under the direct command and control of the geographical
commander-in-chief (CINC) or joint task force (JTF)
commander. Unlike the present environment where
support is fragmented among the service commodity
commands and DoD agencies, the rest of the logistic
structure “tail” is envisioned to be under the control of a
single commander. This change is akin to the previous
consolidation of service strategic transportation resources
and their control and management under the United States
Transportation Command (TRANSCOM). Like that
consolidation of service resources under a single supporting
CINC, there is tremendous opposition to this concept and
organization. It directly challenges the services and would
be a direct attack on their U.S. Code Title 10 responsibilities
to “equip the force.” Yet, these responsibilities have already
been eroded in other areas as well, such as with the
establishment of the Defense Logistics Agency (DLA) in
1962. Today DLA:
manages and purchases items used by all military services
and some civilian agencies, including fuel, food, clothing,
medical supplies, construction material, and the hardware
and electronic items used in the maintenance and repair of
military equipment.
Additionally, the Army itself serves as the DoD
executive agent for most conventional Class V ammunition
and munitions for all the services. The contracted LOGCAP
support, initially envisioned to support Army soldiers, has
now routinely expanded to support all forces within the joint
task force. These three cases demonstrate that Congress or
the Secretary of Defense will modify the means of support,
Title 10 notwithstanding. Consolidation of responsibilities
and functions should improve the effectiveness and the
efficiency of the armed forces.
The next reasonable consolidation of functions to
support the AAN is the establishment of a national level
logistics provider. As in the Division XXI design where
support was removed from the maneuver brigades and
105
consolidated in the Division Support Command (DISCOM),
the same general logic applies at the higher echelons. As
envisioned by the Logistics Integration Agency:
The Army National Provider contains the national level
capability to manage, resource, and control the materiel
management, maintenance, procurement, distribution, and
deployment functions for the Army or other joint and combined
customers. The Army National Provider brings the full power of
the National Logistics Base (DoD Civilian resources as well as
our U.S. Industrial Base), to satisfy the logistics needs of the
supported CINC over a seamless pipeline of support that
extends directly to the warfighting element.24
The National Provider is responsible for filling the
common pipeline to the warfighting CINCs and owns all
resources above that which is traditionally accepted as
direct support. This system fundamentally changes the
concept of ownership of stocks, whatever the class. A unit
may maintain a stock and store it, but it remains under the
ownership of the National Provider who may direct usage
elsewhere. Lest we think this is too revolutionary, we
should recall that overseas Army Class V stocks are treated
in this way today, with only a fraction of the in-theater
stocks actually “owned” by the geographical CINC. The
remainder may be swung to whomever the national
priorities dictate. Likewise, prepositioned afloat resources
may be directed wherever needed.
The National Provider would also control DoD industrial
operations and maintain the contractual relationships with
the civilian industrial base. Again, comparison with
TRANSCOM cannot be avoided. CINCTRANS is the single
DoD point of focus to contract and leverage civilian
transportation resources to support the requirements of
plans and ongoing operations. TRANSCOM performs the
transportation feasibility analysis and determines whether
national transportation resources can adequately support
strategic operation plans. Likewise, the National Logistics
Provider (CINCLOG) would do the same. There would be a
single command to define the requirements, contract with
106
the industrial base, keep warm key operations, maintain
key stocks, and ensure a seamless plug-in to the battle area
logisticians. This command would determine the logistical
feasibility of the plans of warfighting CINCs. There would
be one voice for strategic and operational logistic support.
Because of the existing responsibilities already
incumbent on the Army to support other forces and
establish common lines of communication, maintain the
LOGCAP contract, and control most wholesale Class V, it is
a logical candidate to serve as the National Provider. Just as
the commander of the Air Force Air Mobility Command is
dual hatted as CINCTRANS, the commander of the Army
Materiel Command could also serve concurrently as
CINCLOG.
PITFALLS AND CONCLUSIONS
The envisioned logistical organization for the forces of
the Army After Next clearly brings with it an additional set
of risks which must be carefully considered. First, it is
unlikely that the Army will have the resources to fully
modernize the entire force. There will be, inevitably, tiered
forces. Some, perhaps only the “tip of the spear,” will be a
fully modernized battle force. The remainder of the Army
will remain more traditional, probably similar to the forces
of today. The logistical structure in place must be flexible
enough to accommodate multi-tiered forces.
Secondly, the logisticians within the battlespace must
have high-speed mobility comparable to that of the force
being supported. The nonlinear nature of the battle and the
fact that the logisticians are maneuvering constantly to
support the battle swarms require this capability. Organic
transport capability to provide such high-speed mobility
must be provided.
Finally, without a CINCLOG, it is unclear how the
resources of the nation could be effectively focused to
provide the necessary support in light of the inevitable
reductions of stocks available to DoD. The “iron mountains”
107
are to be eliminated, and their replacement, the “virtual
mountains” located throughout the world, must be managed
and allocated according to national priorities.
These steps represent fundamental cultural changes in
the way logisticians support and how the warfighters
measure it. The new system gives up proven but excessively
expensive ways of doing the support business in exchange
for major technological innovation. It requires unparalleled
trust, coordination, and synchronization between the
G/J-3s and G/J-4s of the future. It is indeed a revolution in
logistical affairs which, if successful, will help provide the
funds, through substantial savings in stocks, to modernize
the force. The choice for the Army is actually quite simple:
stay with the existing logistical organization, structure, and
functions and have, at best, an evolutionary change in force
capability; or take the visionary approach, leverage the
information age and other technologies, and revolutionize
logistics.
ENDNOTES - CHAPTER 5
1. Chairman of the Joint Chiefs of Staff, Joint Vision 2010,
Washington, DC: Chairman of the Joint Chiefs of Staff, 1996, p. 16.
2. Army Chief of Staff, Army Vision 2010, Washington, DC: U.S.
Department of the Army, 1996, p. 10.
3. Deputy Chief of Staff for Doctrine, U.S. Army Training and
Doctrine Command, briefing, “The Army After Next Project. Current
Thoughts on the Army After Next,” 1996.
4. Army Deputy Chief of Staff for Logistics, Revolution in Military
Logistics, Washington, DC: U.S. Department of the Army, 1997, p. 18.
5. Scientific Applications International Corporation, Contract
#MDA-903-93-D-0020, Proceedings of Workshop III on Dominating
Maneuver and the RMA, 1995, p. 10.
6. Department of the Army, ODCSLOG, Revolution in Military
Logistics (Draft 1 Release), Washington, DC: U.S. Department of the
Army, September 11, 1996, p. 17.
108
7. U.S. Army Training and Doctrine Command, TRADOC PAM
525-5, Force XXI Operations, Fort Monroe, VA, August 1, 1994), p. 3-1.
8. Steven Metz, et al., The Future of American Landpower:
Strategic Challenges for the 21st Century, Carlisle, PA: U.S. Army War
College, 1996, p. 13.
9. Department of the Army, ODCSLOG, p. 17.
10. Logistics Integration Agency, The Army Strategic Logistics Plan
Battlespace Logistics—The Vision, Alexandria, VA, undated, p. 4.
11. Charles Link, “21st Century Armed Forces-Joint Vision 2010,”
Joint Force Quarterly, Autumn 1995, pp. 69-73.
12. Chairman of the Joint Chiefs of Staff, p. 24.
13. Logistics Integration Agency, pp. 6-7.
14. U.S. Training and Doctrine Command, pp. 3-14, 3-15.
15. Department of the Army, Functional Area Assessment of the
Army Title 10 Functions “Equip/Supply/Maintain” (Draft Interim
Report), Washington, DC: U.S. Department of the Army, October 20,
1995, p. III-5.
16. U.S. Army Combined Arms Support Command, CSS Technology
Vision for Army After Next, Information Papers, August 27, 1996.
17. Scientific Applications International Corporation, Contract
#DASW-01-95-D-0060, Dominating Maneuver Workshop IV Summary
Report, 1996, tab c.
18. Deputy Chief of Staff for Doctrine, U.S. Army Training and
Doctrine Command, Briefing, The Army After Next Project. Emerging
Impressions. 1996.
19. Jake Tapper, “A Nation’s Future Foretold,” George, February
1997, pp. 68-77.
20. Deputy Chief of Staff for Doctrine, U.S. Army Training and
Doctrine Command, Briefing, The Army After Next Project. Current
Thoughts on the Army After Next.
21. National Defense University Institute for National Strategic
Studies, Project 2025, Washington, DC: National Defense University
Press, 1991, p. 37.
109
22. Deputy Chief of Staff for Doctrine, U.S. Army Training and
Doctrine Command, Briefing, The Army After Next Project. Emerging
Impressions.
23. George T. Babbitt, “Meeting Today’s Logistics Challenges,”
Issue 1, Defense, Washington, DC: U.S. Department of Defense, 1997, p.
7.
24. Logistics Integration Agency, p. 9
110
CHAPTER 6
MANAGING THE INTELLIGENT
INFORMATION GRID
FOR THE ARMY AFTER NEXT
Paul T. Hengst
[Editor’s Note: Virtually everything associated with
future thinking about warfare depends upon a fully
functioning intelligence system. Entire sensor suites are
supposed to be able to locate every friendly element and
most enemy elements, too. Distributed communications are
supposed to enable many-to-many communications so that
individual action within the commander’s intent will
produce an overwhelming effect upon the enemy.
Lieutenant Colonel Hengst describes what this system
must look like and then asks whether we are, in fact, headed
in the right direction. DVJ]
THE INTELLIGENT INFORMATION GRID
Information superiority will be key to the Army After
Next (AAN).1 To achieve this superiority, the AAN will rely
on information networks. These networks will be combined
to form “a single grid so powerful and intelligent that it will
be able to provide common situational awareness to friendly
forces, real-time intelligence on enemy forces and fire
control.”2 This intelligent information grid (I2G) will be
capable of connecting the multitude of sensors and
information systems together into a seamless information
environment.
Decreases in Department of Defense (DoD) funding and
manpower are driving planners to develop a grid that will
operate in a “management-by-exception mode without
human interface.”3 It will represent an enormous departure
from current network management techniques where
111
thousands of people perform day-to-day network
management functions. The purpose of this paper is to
examine the I2G.
WHAT THE I2G MAY LOOK LIKE
The best analogy to what the I2G should look like is the
human nervous system. That system is a remarkable
information-sensor network of hundreds of miles of nerves
running through the body connecting all the major sensory
centers. The sensors and nerve network work in harmony to
provide the individual total awareness of his surroundings.
Within this network, the brain acts as a central computer,
while the spinal cord is the backbone. Connected to the
spinal cord are the various major nerve bundles that
provide the path for sensory inputs to travel to the brain.
This complex network foresees problems and responds to
threats. Should a major attack on a component of the
network occur, like an injury, the brain automatically
responds so as to limit the damage. The network of nerves
can also be self-healing when minor damage occurs. This
nervous system analogy is so accurate that some AAN
planners have described the I2G as a “living internet.”4
The future challenge is developing control mechanisms
in the I2G that are similar to our nervous system. But,
unlike the homogenous, single, connected network of the
human body, the AAN will still be operating under a
system-of-systems concept in which multiple systems will
exist and be connected together.5 The number of individual
sy stems can b e d i vi d ed i nto two major ar eas,
communications systems and information systems. For
clarity, each area will be discussed as a separate entity.
Communications Systems.
The human nervous system can be broken down into the
brain, spinal cord, and nerves. Similarly, the I2G can be
broken into three key components. First is the backbone
system, analogous to the spinal cord and major nerve
112
bundles, capable of carrying a high capacity of information.
The second area is the local systems that extend from the
backbone to the individual nerves, or users. The final area is
the switching or transfer of signals between local and
backbone systems.6
Backbone Systems. The backbone network will be
comprised of the major communications systems we use
today: satellites, microwave, and cable. No major
technological leap is predicted for backbone systems.
However, developing technology will drive these systems to
ever increasing bandwidths necessary to handle the volume
of expected traffic.
Satellites will become increasingly important for two
major reasons. First is the flexibility needed to move fairly
quickly to extend the backbone to areas without terrestrial
systems; and second is the need to cover large geographic
regions with a single platform. Evolving compression
techniques will increase bandwidth; however, transmission
delays due to distance will still be a limiting factor for
satellites.
The bulk of the terrestrial backbone will continue to be
microwave and cable systems. As in the case of satellites,
technology will continue to push terrestrial systems to
handle larger bandwidths. The current trend to replace
copper-based cable with fiber optic cable will increase
available bandwidth.7
As with our current force, the AAN will contract with
commercial vendors to provide the bulk of the backbone
systems, primarily for economic reasons.8 Expected future
budgets preclude installation, operation, and maintenance
of DoD-unique global communications networks;
technology upgrades necessary to remain state-of-the-art
will require manpower to operate and maintain backbone
systems. In addition, an infrastructure based on
commercial standards will help ensure interoperability.
113
Local Systems. Local systems connect users through
voice and data networks to the backbone. Like the
backbone, DoD will continue to use today’s line-of-sight
radio, cable, single channel satellites, and cellular systems.
Increases in bandwidth are also expected. At this level,
military-unique systems will fill niche requirements
unavailable from commercial vendors.
The local communication system in the AAN will fill two
major requirements. First is portability. 9 Using a
combination of terrestrial and projected space-based
cellular systems, such as IRIDIUM, cellular technology
offers the flexibility necessary to communicate in fluid and
widely dispersed operations.10 Second is that cellular
technology offers a cheap alternative to installing a
permanent cable-based infrastructure.11 This is especially
critical for contingency operations in lesser developed areas.
Local and space based cellular systems will also reduce the
“rolling stock” infrastructure equipment and manpower
currently delivered during deployments.
Switching. Unlike backbone and local systems, which
will see a gradual technological evolution to better, higher
bandwidth systems, switching will undergo two major
technological leaps, the combining of analog and digital
switching and the arrival of the communications unmanned
aerial vehicle (UAV).
The development of a single device to quickly switch both
voice and data will greatly reduce the infrastructure
burden. Currently, parallel switched networks are
required: analog for voice and digital for data. The cost of
such parallel networks will be unaffordable in the AAN.
Additionally, parallel networks complicate the information
sharing necessary to create common situational awareness.
Technological improvements in optical switches will also
increase switching speed, preventing the switch from
becoming a bottleneck.12
The second technological leap in switching is the
communications UAV. Used in a quasi-satellite role, UAVs
114
will be used as relay/switching stations between networks.
Future enhancements, like in-flight refueling, will increase
loiter time, making UAVs candidates to supplement or
replace existing military communications satellites.
Additionally, these UAVs could provide the switching link
from terrestrial cellular systems to the space backbone,
particularly for deployments outside the normal
commercial satellite footprint.
In summary, the communications systems of the AAN
can be characterized as a commercial based system
augmented by military assets to create a system-of-systems
grid. The predominant communications architecture at the
local level will be a cellular system based on commercial
standards and protocols. Maximum use will be made of
space based communications platforms. New technological
developments will be integrated into an increasingly fiber
optic based infrastructure.
Information Systems.
The five senses—smell, touch, taste, sight, and
hearing—comprise the sensors of our human system. Input
from the sensors combine with the brain’s stored knowledge
to help us make decisions. In the AAN, information systems
will include the full range of sensors, automated decision
support tools, and databases working in a common
operating environment to aid commanders in decision
making. The processes used by our brain to make these
decisions are analogous to application programs.
C ommon Oper a ti ng Envi r onme nt ( COE) . The
development of the COE will be critical to prevent some of
the information systems problems we currently experience.
A COE provides a common look, touch, sound, and feel to the
user, and COE ensures the interfaces from platform to
platform are consistent.13 The COE attempts to create a
homogenous environment, much like our nervous system,
where data is defined and shared easily between systems. In
order to obtain a common picture of the battlespace and take
115
advantage of the vast amounts of data being collected,
systems must be totally interoperable and capable of
sharing collected data. To ensure this interoperability, the
COE will establish standards for a wide range of items,
including operating systems, communications protocols,
and individual data elements.
Applications. The types of applications working in this
COE will range from military-unique command and control
to administrative. Commercial software industry will
provide the necessary applications; however, some
applications will require development of military-unique
interfaces.
The bulk of the applications developed will be systems
that collect information from a variety of databases. These
databases will be built from the vast number of sensors
expected to be in the AAN information environment. They
will be linked via the I2G to ensure information availability.
These interconnected databases will give an increasing
amount of battlespace information to the commander, and
research is underway to solve information overload
problems.14 Two intertwined concepts, data-mining and
digital agents, will come to fruition in the AAN to assist
commanders in grappling with information overload.
Additionally, by permitting the commander to test multiple
courses of action prior to making final decisions,
simulations will help in managing information overload.
Data-mining is the ability to take advantage of the vast
amounts of data being collected and stored in various, often
unrelated databases. Military applications are just
scratching the surface of this area. In the commercial sector,
data-mining determines individual buying patterns. A
grocer may determine that most customers who purchase a
particular snack food usually buy the same type of soda, and
that they purchase the items late in the week. By placing
the two items close together on the shelf or combining them
in a package, the grocer may increase his sales. The grocer
also establishes delivery dates for both items late in the
116
week to reduce the amount of time he has to warehouse the
items. All the data revealing such purchase patterns are
gathered when the items are scanned at the point of
purchase. Using data-mining concepts, logistics units can
use similar techniques to determine key item delivery
dates. Operational units can use data-mining to correlate
data from multiple sensors to establish possible tactical and
operational patterns, both ours and the enemy’s.
Digital agents are “computer surrogates that possess a
body of knowledge both about something (a process, a field
of interest, a way of doing) and about you in relation to that
someth in g (y ou r tas te, your i nc l i nati on, your
acquaintances).”15 With the perceived glut of information
available to the commander, the use of digital agents will
assist him in profiling critical information requirements
necessary for decisionmaking and could also reduce the
human staffs that now collect and store this critical data.
Simulation is the final piece assisting the commander
with information overload. The nonlinear battlefield has too
many variables for most commanders to assimilate.16
Simulation will allow commanders to pull information into
the simulator, test assumptions, and help determine the
factors critical to success prior to conducting an operation.
Simulations will take into account the multitude of factors
in a nonlinear problem that linear database searches,
employing data-mining or digital agents, cannot.
Additionally, the visual nature of simulations assists the
commander in retaining information in his mind.
The I 2 G, then, will consist of commercial-based
communications systems at the backbone and local level.
The communications systems will link the various
components, sensors, databases, and application programs
into a system-of-systems. Intelligent applications connected
by the I2G will greatly assist the commander in decisionmaking.
117
WHAT TO MANAGE
With the I2G now described, it is necessary to determine
what functions within the grid need to be managed. As
mentioned, the goal is a grid that requires minimum human
intervention. This implies that a certain amount of
intelligence must be built into the systems that make up the
I2G. With 25 years of unfulfilled promises of artificial
intelligence (AI) in the past, it is unlikely that AI will
progress in the next 25 years to the point where no human
intervention is required. Therefore, the I2G will use a
combination of artificial and human intelligence to manage
the major functions of configuration control, security, and
repair.
Configuration Control.
There are three major configuration control areas:
architecture, device addressing, and bandwidth.
Architecture. While not a real-time management
feature, many current problems in network management
are born of a lack of architectural control. Once again, it is
possible to look at the nervous system as an analogy. One of
the beauties of the human body is that underneath the skin
we are pretty much alike. This is not true for our current
information and communications systems. Not having a
standard system architecture, we often rely on one or two
gurus who understand how our systems work. If a problem
occurs and the gurus are gone, nothing happens until they
return. To overcome this problem, a standard architecture
must be adopted. The Army has recently published the
Army Technical Architecture (ATA) to help standardize the
way we put networks together.17 The ATA is also being used
as the baseline for the development of a Joint Technical
Architecture.18 This will help ensure interoperability in the
joint information environment.
Device Addressing. The second issue of configuration
control is knowing what devices are in the network, such as
118
satellites, switches, routers, computers, weapons platforms,
and sensors. The expected fluid nature of warfare in the
AAN requires devices that are self-addressing. Current
manpower intensive addressing schemes, such as call signs
on a radio net, a phone number, or an Internet Protocol
address, will be unacceptable in an era of reduced
manpower. Maximum use will have to be made of intelligent
devices capable of registering themselves in the I2G.
Bandwidth. The final aspect of configuration control is
bandwidth. By controlling the configuration of the
connected devices, the grid should be able to self-configure
to ensure that necessary bandwidth is available to all users.
As noted in the communications system description,
available bandwidth is expected to increase in the AAN;
however, it will still be possible that multiple devices could
overwhelm a particular link, which would decrease
performance for all who use that link. Although irritating
today, it could become life threatening when soldiers and
weapons platforms are waiting for critical intelligence or
“shooting” data. Therefore, certain platforms and sensors
will have to receive priority for the available bandwidth,
with administrative traffic riding in the holes between
priority traffic.
In summary, configuration control will be provided by a
common grid architecture, the addressing scheme of the
device, and, finally, the allocation of bandwidth across the
grid. Critical to the success of configuration control is a
certain degree of intelligence built into the network to
achieve the objective of minimum human intervention.
Security.
The second major function to manage is security, which
must likewise require minimum manpower. The three
major security items that require management are access
security, information assurance, and infrastructure
protection.
119
Access Security. Unlike our current security protection
architecture where we build separate systems of different
security classifications, in the AAN we will have one grid
with access security being provided at the “point-of-entry.”
This is not a new concept and is used in our current voice
networks. For example, the STU-III telephone connected to
a commercial line off-post is just as secure as when it is
connected to a government-owned line on an installation.
Point-of-entry security is now being developed for a variety
of devices, including cellular telephones19 and computers.20
Point-of-entry security implies that we will have achieved a
certain degree of multilevel security, which allows a single
computer to operate at different security levels. The
planned battlefield combat identification system for the
identification of friendly vehicles can be used as a model for
access security. Under this scheme, a device would enter the
grid, be queried for its address and routing information, be
identified as an authorized device, and then be connected to
the I2G.21
Information Assurance. The second area of security is
information assurance. We must retain the ability to protect
the information we are using. Information assurance has
four elements: availability, integrity, confidentiality, and
nonrepudiation. 2 2 Availability assures access to
information by authorized users, integrity protects the
in forma tion from unauthor i zed c hange, whi l e
confidentiality protects the information from unauthorized
disclosure. Finally, nonrepudiation is the undeniable proof
that users are who they say they are. Loss of information
assurance will make all data suspect. Such loss would be
catastrophic to an Army that relies on information to
maintain battlefield dominance.
Infrastructure Protection. The final security area is
infrastructure protection, currently addressed as command
and control warfare in Army Information Operations
terms,23 or as Defensive Information Operations in joint
terms.24 Infrastructure protection is the ability to protect
the grid from attack and takeover. The importance of this
120
issue is well-known, being the driving force behind the
recent President’s Commission on Critical Infrastructure
Protection.25 The commission examined the “cyber” threats
to the national telecommunications infrastructure. If used
properly, the output of this commission will result in shared
responsibility between government and the commercial
sector to provide adequate infrastructure protection. This
shared responsibility will be critical to a military dependent
on commercial communications systems.
Repair.
The final function to manage is repair. Repair of the I2G
resembles the healing process of our body; some repair is
self-healing, and some requires external intervention.
Similar to the case of configuration control and security,
manpower to perform repair functions must be kept to a
minimum. The loss of manpower combined with the
increasing complexity of network repair will pose a critical
challenge to AAN.26
The complexity of repair will reduce most local
maintenance to no more than item/board replacement.
Diagnostic work will be accomplished through the grid by a
centralized maintenance facility with the intelligent tools
capable of analyzing the full range of possible alternatives.
Individual platforms will have some limited self-diagnostic
capability, but it is unlikely that crew members on
informational weapons platforms like Crusader or
Commanche will be able to do more than board level
replacement.
Like other management functions, the diagnostic repair
tools will require some degree of artificial intelligence. The
greatest technological leap in this area will be in the tools
that not only find the problem, but correct it without human
intervention. These maintenance tools would automatically
create a log of their actions. The log would be reviewed by
maintenance personnel in conjunction with other
intelligent tools as a basis for further action. For example,
121
the grid diagnostic tool would notice that a network laser at
a remote unmanned communication node was pulsing too
fast. Automated maintenance tools would take the laser out
of service and activate the backup laser. The action would be
recorded in the log, and the automated maintenance
supervisor tool would prompt the repair person to physically
replace the bad laser with a new one. For catastrophic
problems, the automated maintenance supervisor would
call or page the on-call repair person to immediately
perform the necessary repair.
While we may never fully get away from some manpower
requirements such as hardware replacement, most of the
maintenance functions of the I2G must be self-repairing.
Intelligent programs, able to identify errors and take
corrective measures to repair the damage, are critical in this
area.
WHO MANAGES THE I2G
After identifying what we will manage—the grid and
individual functions—it is necessary to determine who will
do the managing. When asked who controls your body, most
of us would state, “I do.” But what makes up the “I” in the
grid will not be replicated by a single entity as our brain does
for our body. Like today, the I2G will be managed from a
variety of sources, some managing global functions, others
managing local functions.
There will be two factors driving the “who”—jointness
and manpower. Almost all operations will be joint;
therefore, all service elements will require interoperable
systems that are managed by a joint force, although it will
probably not be the Joint Information Corps proposed by
some authors.27
The reduction of manpower will manifest itself in some
type of consortium of commercial vendors and military
units. These two factions will be combined in a virtual
operations cell to manage the function of the grid. Given the
current state of deregulation, there may be a number of
122
service providers in the operations cell. The consortium will
conduct a variety of tasks, from day-to-day operations to
standards setting. Military personnel will monitor the
commercial networks and establish priorities between
them. Both the Gulf War and the Force XXI demonstrations
have shown the utility in using contractors to supplement
military communications management.28
The development of a consortium to mange the I2G will
be an evolutionary process. Reliance on commercial vendors
to perform tasks such as logistics, maintenance, and
communications will make this concept more acceptable.
Additionally, joint military and commercial efforts will help
develop relationships necessary to support the transition to
the consortium concept.
WHERE TO MANAGE THE I2G
Thus far, we have examined what to manage in the grid
and who will do the management. It is also necessary to
examine where we will manage the grid. Unlike the human
nervous system, there will not be a single centralized
management center. More likely, the widely dispersed
system-of-systems will be managed at different locations,
with each location being visible to all the other systems.
The majority of these centers will almost certainly be
located in the continental United States (CONUS).
However, recent efforts to complete “a global pact that
would phase out monopolies and restriction on competition”
across the world-wide telecommunications industry may
result in some centers residing in other countries.29
Military management centers will also be in CONUS.
These centers can be collocated with commercial vendors,
but more likely will reside on existing installations with
communications links to the commercial centers. Based on
the amount and type of service being contracted, liaison
officers may be collocated with the commercial vendor.
123
A capability will exist to establish deployable forward
mini-centers to give commanders on the ground the ability
to reallocate scarce resources and exercise limited control
over portions of the grid, especially if the grid is established
in a remote area. Additionally, local grid managers will
have the capability of keeping the system running if cut off
from CONUS based management centers. However,
primary management responsibility will remain with the
CONUS centers. This reality argues for deploying the
smallest force and being able to mass quickly, complete the
mission, and disperse the force.
In an age of information warfare, where borders no
longer matter and asynchronous attacks against our
systems are expected, the lack of one central control location
will be an advantage. This de-massification of network
ma n ag emen t wil l enhanc e the r ed und anc y and
survivability of the grid. Therefore, the majority of network
management functions for the I2G will be controlled from
CONUS centers in a tightly coupled military-commercial
management structure. The military will continue to
maintain some type of deployable centers with limited
ability to manage local assets.
IMPLEMENTATION CONCERNS—
ARE WE HEADED IN THE RIGHT DIRECTION?
Some of the changes predicted above are built on
evolutionary change, i.e., use of commercial vendors, while
other changes may be more revolutionary, i.e., UAVs. The
concerns about the success of these concepts can be broken
down into two broad areas, technology and management.
Technology.
Improvements in three technological areas are needed if
the I2G described above is to work. First, there have not
been significant advances in producing artificial
intelligence in almost 40 years.30 Some progress has been
made around the edges, with fuzzy logic and pattern
124
recognition, but true intelligence replicating human
analytical reasoning has not occurred. The I2G described
above requires significant artificial intelligence,
particularly self-repair and access control.
Second, like artificial intelligence, much has been
promised in the area of multilevel security, with very
little result. Some products, like the multilevel security
personal computer card, FORTEZZA, may lead to a
breakthrough in this area. Without multilevel security, the
necessary security at the point-of-entry may be more
difficult.
Third is database technology, particularly those
areas that support data-mining and warehousing. It will be
critical to wrap all the sensor information into a framework
understood by the decisionmaker. Without improvement in
the database area, data will be collected and stored, but
commanders will be unable to use it. While the use of digital
agents may assist in this area, there is also a downside to
their use. As we collect information about one topic, we often
incidentally discover information about something else that
adds to our knowledge. By limiting the amount and type of
information to just the few items a digital agent gathers, it
is possible for the commander to miss other information
that could impact on his decision.31
Management.
There are three major concerns with the management of
the I2G: reliance on commercial systems, funding, and
necessary future decisions.
Commercial Systems. The I2G will rely predominantly
on commercial systems. While this is not a great leap from
where we are today, changes in the nature of the
telecommunications business, such as global business
groups and deregulation, will greatly change the way we
interact with the vendors. The critical point is how the
business world responds to what the military perceives as a
125
crisis situation. As we rediscovered in the Gulf War, we
cannot always adequately predict what assets we will
need.32 If limited assets are available, service providers may
have to choose between military units and commercial
customers to increase profits or support a crisis. This
becomes particularly challenging as telecommunications
companies take on a more multi-national role, and appeals
to patriotism cease to resonate. This may require changes in
contracting mechanisms to support military requirements
in times of crisis. A communications program similar in
principle to the Air Force Civil Reserve Air Fleet program is
another possible option.
Funding. We rely on commercial systems for funding
because we cannot afford to replicate the global networks
commercial vendors have built. This will not change in the
future and defines us as simply another customer in the
open market. Vendors will continue to find new and unique
ways of billing, which could increase our overall information
costs. This is particularly true for funding contingency
operations, where contractual agreements may not exist.
Sufficient funding will be necessary to take advantage of
technological gains and, in some military-unique cases,
push research. Trying to balance manpower, technology,
and systems fielding will be difficult with limited funding.
However, the recent decision by the Army’s Deputy Chief of
Staff for Operations to skip a generation of equipment and
concentrate on information technology should assist in
focusing available funding.33 Finally, funding must be made
available to upgrade our installation infrastructure,
especially replacing copper and lead cable unable to handle
the expected bandwidth requirements of future information
systems.
Necessary Future Decisions. The final management area
concerns future decisions. These decisions encompass
dev elopmen t resp onsi bi l i ty, ac qui s i ti on, r i sk,
interoperability, and training.
126
The overall requirement to develop an I2G must be
assigned to one organization. Currently the services and
separate DoD agencies are working on unique systems,
often without coordination. The Defense Information
System Agency or Assistant Secretary of Defense C3I may
be in the best position to pull the individual efforts together,
including continuation of the current move toward a Joint
Technical Architecture.
T h e I 2 G will not c ome to f r ui ti on unti l the
acquisition/procurement problem is fixed. Given a 12-18
months life span of most computer related equipment, the
time now required to obtain state-of-the-art information
technology is unacceptable. Strides have been made with
the procurement of commercial-off-the-shelf products, but,
if we continue with current methods, information
technology will continue to outpace our ability to put the
latest technology in the hands of the soldiers. Additionally,
leaders and managers must accept some individual
responsibility for funding upgrades instead of waiting for
everything to be pushed down from higher levels.
The Army will have to accept the risk of using
commercial systems or it will have to fund a separate
communications infrastructure which it cannot afford. The
crux of the problem is weighing the potential information
warfare (IW) threat against the billions of dollars it may
take to build an alternative global system. Building
separate systems will be expensive in both equipment and
manpower, but it significantly lowers IW risk. Complicating
the decision is determining whether an IW attack
constitutes an attack on the homeland and whether it
necessitates a military response.
To improve interoperability, tactical communication
systems, like Mobile Subscriber Equipment, must work
smoothly with commercial systems. This requires some
equipment/technological changes as well as policy changes.
Multi-level security equipment expected to be fielded in the
next 5-10 years should help to resolve the policy issue of
127
classified networks being connected to unclassified
networks. Seamless communications from deployed
locations to CONUS installations cannot truly be
accomplished until the link between tactical and
commercial systems is fixed.
The final issue that must be addressed is training. One
author has called for the immediate training in
knowledge-based warfare for “soldiers, sailors, marines,
and airmen at all levels of professional military
education.”34 This is necessary if we are to understand not
only how to operate and maintain the I2G, but also take
advantage of the opportunity it offers in the way of
information operations.
CONCLUSIONS
The AAN will require an I2G capable of supporting the
commander’s information needs. The human nervous
systems provides the architects of the I2G the best example
of what the grid should be. It should be a self-controlling and
self-healing grid that users can plug into anywhere in the
world. Technology will not fully take care of all grid
management requirements. Therefore, human intervention
will be necessary, but must be kept to a minimum in light of
dwindling manpower resources.
The critical functions the I2G must manage include
architecture, device addressing, and bandwidth. Of these,
architecture may be solved in the not too distant future
when all services will be using a common joint architecture
developed from the Army Technical Architecture model.
Device addressing will be critical to quickly linking the full
array of sensors, information systems, and communications
devices to the grid. Progress will have to be made in
database technology to fully solve the device addressing
issue. Finally, bandwidth may no longer be a problem as
new techniques and mediums increase the amount of
bandwidth available. However, in crisis or outages,
128
bandwidth will still have to be managed and allocated to
high priority users.
Security will continue to be a major concern in the AAN,
particularly as we become completely reliant on
information technology. The threat of an asymmetrical
attack against our information systems will continue to
drive security technology. Of particular concern is the
access security necessary to validate each device in the
network and the assurance that the information is secure.
Finally, we must protect the infrastructure from attack.
The I2G will be managed by a consortium of business and
military personnel from locations primarily in CONUS. We
will continue to rely on commercial communications
systems to provide the bulk of our communications
requirements. The rapid changes in the telecommunications industry will drive us to establish new ways of doing
business. For example, new statutory and contractual
instruments that provide for the reallocation of critical
communications infrastructure in times of crisis will be
required.
The proposed management of the I2G is cause for
concern. Technological issues in database technology,
multi-level security, and artificial intelligence may delay
the development of the I 2 G. Additionally, without
establishing working relationships with commercial
vendors and assurance of funding, the I2G can not be
realized.
The creation of an I2G has already started, with the
linking of current communications and information
systems. However, at best it could be described as a
conglomeration of often non-interoperable, manpowerintensive systems unable to share information. This
conglomeration must be turned into a seamless information
grid capable of providing commanders with the necessary
information tools to aid in decisionmaking. All of this must
be accomplished with a minimum of human intervention.
129
Without an I2G, the information dominance necessary to
achieve success in the AAN will not be obtainable.
ENDNOTES - CHAPTER 6
1. “Information superiority is the ability to collect, process, and
disseminate an uninterrupted flow of information while exploiting or
denying an adversary’s ability to do the same.” John M. Shalikashvili,
Joint Vision 2010, Washington, DC: The Joint Staff, 1996, p. 16.
2. TRADOC Annual Report to the Chief of Staff of the Army on Army
After Next Project, Fort Monroe, VA: Training and Doctrine Command
Army After Next Staff, June 1996, p. 13.
3. Ibid.
4. The term “living internet” or internetted “living” system of
systems is from the Training and Doctrine Command Army After Next
briefing to the U.S. Army War College Army After Next Advanced
Course on October 23, 1996.
5. William A. Owens, “The Emerging System of Systems,” US
Naval Proceedings Vol. 121/5/1,107, May 1995, p. 37; and Thomas G.
Mahnken, “War in the Information Age,” Joint Force Quarterly, Vol. 16,
Winter 1995-96, p. 40.
6. Switching in this context takes in the entire range of switches,
routers, and other devices used to switch signals between systems.
7. Vincent W. S. Chan, “All-Optical Networks,” Scientific
American, Vol. 273, No. 3, September 1995, p. 73; and David L. Osborne,
Domestic Trends to the Year 2015, Forecasts for the United States,
Washington, DC: The Library of Congress, 1991, p. 190.
8. Robert K. Ackerman, “Digital Formats Complicate Information
Security Tasks,” Signal, Vol. 51, No. 6, February 1997, p. 22.
9. George I. Zysman, “Wireless Networks,” Scientific American,
Vol. 273, No. 3, September 1995, p. 71.
10. When it becomes operational in 1998, the IRIDIUM system will
provide portable, universal service through a constellation of 66
satellites in low earth orbit. Subscribers will use pocket-size, hand-held
IRIDIUM telephones transmitting through digital facilities to
communicate with any other telephone in the world. The IRIDIUM
system is being financed by an international investor consortium to
130
telecommunications and industrial companies. “IRIDIUM” available
from http://www.computerreview.com /iridium.htm; Internet, access
March 15, 1997; and “Totally Global, Global Mobile Personal
Communications by Satellite Offers New Vision,” Iridium on line
magazine, Fall 1996, available from http://www.iridium.com/public/
fall/pubcov.html; Internet, access February 20, 1997.
11. Zysman, p. 70; and Sheldon Teitelbaum, “Cellular Obsession,”
Wired, Ed. 5.01, January 1997, p. 147.
12. During a visit to Lucent Technology Center in Homdel, NJ, the
author was briefed on an all-fiber switch that was being developed; and
Chan, p. 73.
13. Shawn Butler, David Diskin, Norman Howes, and Kathleen
Jordan, “Architectural Design of the Common Operating Environment
for the Global Command and Control System,” IEEE Software, Internet,
http://www.computer.org/pubs/software/extras/butler/butler.htm,
accessed March 15, 1997, p 8.
14. Andrew C. Braunberg, “Brain’s Affinity for Imagery Eases
Information Overload,” Signal, Vol. 51, No 4, December 1996, p. 49. Also
see Lawrence E. Casper, Irving L. Halter, Earl W. Powers, Paul J. Selva,
Thomas W. Steffens, and T. Lamar Willis, “Knowledge-Based Warfare:
A Security Strategy for the Next Century,” Joint Force Quarterly, No.
13, Autumn 1996, p. 84.
15. Nicholas Negroponte, Being Digital, New York: Vintage Books,
1995, p. 151.
16. Thomas J. Czerwinski, “Command and Control at the
Crossroads,” Parameters, Vol. XXVI, No. 3, Autumn 1996, p. 126. Also
see Glenn M. Harned, The Complexity of War: The Application of
Non-linear Science to Military Science, Paper Submitted At the Marine
Corps War College, Quantico, VA: The Marine Corps War College, June
5, 1995.
17. The Army Technical Architecture, Version 4.0, Executive
Summary, Washington, DC: The Army Staff, January 30, 1996, p. 1.
18. Address by LTG Otto Guenther, DISC4, The Army Staff, to the
USAWC Class of 1997 on January 29, 1997. The Joint Technical
Architecture being developed by the Joint Staff will use the Army
Technical Architecture as the base model.
19. Sean Patrick Burgess, “Art of the Small Supplies Secure
Cellular Voice, Data,” Signal, Vol. 51, No. 1, September 1996, p. 60.
131
20. “What is DMS,” available from the DMS Program Manger at
internet, http://www.monmouth.army.mil/dms/whatis.htm; and
National Security Agency Multilevel Information Systems Security
Initiative (MISSI) Program explained by Defense Information System
Agency (DISA) at internet, http://www.disa.expoqa3.html.
21. Scott R. Gourley, “The Battlefield Combat Identification
System,” Army, Vol. 47, No. 1, January 1997, p. 52.
22. The Joint Staff currently uses 5 elements: availability, integrity,
identification and authentication, confidentiality, and non-repudiation.
In the I2G, identification and authentication is accomplished by access
security. The Joint Staff, Joint Doctrine for Information Operations,
First Draft, JCS Pub 3-13, Washington, DC: The Joint Staff, January
21, 1997, p. III-2.
23. Department of the Army, Information Operations, Field Manual
100-6, Washington, DC: U.S. Department of the Army, August 27, 1996,
pp. 3-5.
24. JCS Pub 3-13, p. III-6.
25. President William J. Clinton, Executive Order 13010, Critical
Infrastructure Protection, July 15, 1996. Taken from the Federal
Register: July 17, 1996, Vol. 61, No. 138, 37345, Federal Register Online,
internet, wais.access.gpo.gov.
26. Solving individual network problems has become increasingly
complex. With computers now being connected to networks or, in some
cases, multiple networks, an individual problem could have one of four
possible outcomes. The problem could be hardware, software, network,
or some combination of the three.
27. Martin C. Libicki, The Mesh and The Net: Speculations on
Armed Conflict in a Time of Free Silicon, Washington, DC: National
Defense University Press, 1994, p. 52.
28. Dennis Steele, “Countdown to the Next Century,” Army, Vol. 46,
No. 11, November 1996, p. 21.
29. “US Keeps World Waiting on Communications Deal,” Carlisle
Sentinel, February 15, 1997, p. A3.
30. Douglas B. Lenat, “Artificial Intelligence,” Scientific American,
Vol. 273, No. 3, September 1995, p. 80; and H. M. Collins, Artificial
Experts: Social Knowledge and Intelligent Machines, Cambridge, MA:
The MIT Press, 1990, p. 3.
132
31. Cliff Stoll in his book, Silicone Snake Oil, discusses at several
points the topic of searching for information leading to other
information. In particular, see Chapter 11, “Wherein the Author
Considers the Future of the Library, the Myth of Free Information, and
a Novel Way to Heat Bathwater,” Silicone Snake Oil, New York:
Doubleday, 1995, pp. 173-214. Also see Jaron Lanier, “My Problem with
Agents,” Wired, Ed. 4.11, November 1996, p. 157.
32. Alan D. Campen, “Gulf War’s Silent Warriors Bind U.S. Units
Via Space,” Signal, Vol. 45, No. 12, August 1991, p. 81.
33. “Modernizing to Achieve a Capabilities-Based Force,” Army
Deputy Chief of Staff for Operations briefing to the Army Research
Laboratory (ARL) on February 18, 1997, and further discussed with
U.S. Army War College Army After Next students on a visit to ARL on
March 3, 1997.
34. Casper, et al., p. 89.
133
CHAPTER 7
DATA INTEROPERABILITY
FOR SYSTEMS OF SYSTEMS:
OUR ACQUISITION PARADIGM MUST
CHANGE TO ACHIEVE IT
William T. Lasher
[Editor’s Note: While Lieutenant Colonel Hengst’s paper
addresses the necessity for an Intelligent Information Grid,
this paper illuminates some of the problems that must be
overcome to arrive at a point where systems of systems can
become an operating reality. Together, these two papers lay
one of the the foundation stones for the Army After Next.
DVJ]
INTRODUCTION
Success of the Army After Next (AAN) will be heavily
dependent on our ability to manage information adeptly.
Army Vision 2010 calls for us to “gain information
dominance . . . to create a disparity between what we know
about our battlespace . . . and what the enemy knows about
his.”1 Joint Vision 2010 foresees:
increased access to information and improvements in the
speed and accuracy of prioritizing and transferring data
brought about by advances in technology of old. We must have
information superiority: the capability to collect, process, and
disseminate an uninterrupted flow of information while
exploiting or denying our adversary’s ability to do the same.2
It calls for us to develop “a new conceptual framework for
operations. The basis for this framework is found in the
improved command, control, and intelligence which can be
assured by information superiority.”3
135
To attain this information superiority, we will have to do
much more than buy new hardware and develop advanced
software. We will need to build new systems which can
freely interoperate. We will need to build systems of
systems. DoD’s current acquisition paradigm, however,
does not enforce development of interoperable systems.
This paper discusses the types of interoperability
necessary to create a system of systems, shows why the
current acquisition system severely inhibits achieving data
interoperability necessary for the realization of this goal,
and, finally, discusses alternatives to the current
acquisition strategy that could provide the type of
interoperability that facilitates development of joint
systems of systems.
THE NEED FOR SYSTEMS OF SYSTEMS
In his visionary article, “The Emerging System of
Systems,” Admiral William Owens describes a future battle
en v iron men t wh er e “systems of systems ” wi l l
synergistically improve the strategic leader’s abilities to
command and control joint forces. They promise to keep
commanders at all levels fully informed, assist them in
better and timelier decisionmaking, and, in some cases,
automatically detect and respond to events, a feat largely
beyond our grasp today.
So what is a system of systems? In essence, it is an
executive level automated system that pulls data from
functional level information systems (IS). As shown in
Figure 2, the executive information system could poll
subordinate information systems for either raw (base level)
data, or some form of aggregate or abstract data derived
from the subordinate system’s base level data. Subordinate
information systems could be programmed to pass critical
data to the executive system periodically or as triggered by
key events. The executive level system could then present
this information to senior commanders to assist in
decisionmaking.
136
Abstract or
Aggregate Data
Base Level Data
Top Level System of
Systems
Abstract or
Aggregate Data
Abstract or
Aggregate Data
Base Level Data
Base Level Data
Low Level System of
Systems (e.g. C2 System)
Low Level System of
Systems
Abstract or
Aggregate Data
Abstract or
Aggregate Data
Abstract or
Aggregate Data
Base Level Data
Base Level Data
Base Level Data
Functional (Stovepipe)
Information System
Functional (Stovepipe)
Information System
Functional (Stovepipe)
Information System
Figure 2.
Illustration of a System of Systems.
In some predetermined cases, executive level systems
could instruct subordinate information systems to take
action based on an automated analysis of the available
information, for example, detection of a missile launch.
Actually, military systems of systems have existed for
centuries. A standard command and staff structure is
essentially a system of systems. Subordinate commanders
and staffs freely communicate laterally. They provide
information and recommendations to the commander;
based on his interpretation of the information, the
commander returns guidance. While we have automated
functional information systems which assist staff officers
and commanders, the interface between these systems is
still a human one. In a true system of systems, as Admiral
Owens envisions it, data would be freely passed between
functional and executive level information systems without
requiring human interpretation or intervention. It is this
total interoperability between systems that will ultimately
137
allow us to improve battlefield awareness and dramatically
shorten our decision cycles.
CONSIDERATIONS IN BUILDING
INTEROPERABLE SYSTEMS
Three primary challenges must be overcome to allow any
two systems to “talk” to each other directly (see Figure 3).
First, the systems must be technically compatible; that is,
System A must have a communications interface
electronically compatible with that of System B. Second, a
communications link must be established between the
systems. Third, System A must correctly interpret the
information it gets from System B.
Communications Link
COMM Interface
COMM Interface
System Data
SSN
000-24-7890
123-45-6789
098-76-5432
System Data
Last Name First Name
DOE
BURPEE
JONES
SSN
000-24-7890
123-45-6789
098-76-5432
JOHN
FRED
JAMES
Last Name First Name MI
DOE
BURPEE
JONES
JOHN
FRED
JAMES
J
G
R
System B
System A
Figure 3.
Communicating Between Systems.
The Technical Challenges.
The first two “technical” challenges can be solved, given
the right hardware, software, and technical expertise (i.e.,
enough money). Modern network technology and maturing
industry standards (such as those used for the internet) are
making the technical problems far less formidable than
they once were.
138
The Data Challenge.
The third and most difficult challenge in allowing
systems to talk to each other is getting them to exchange
data. This is actually a design problem. It can be difficult, or
impossible, to properly exchange data between systems
which have different data designs.
The Growing Need for Sharable Data.
The Department of Defense (DoD) has long recognized
the need for building systems with sharable data. In the
stovepipe era, however, information systems were built
primarily to perform one and only one function (e.g., the
Joint Uniformed Military Pay System). These were large,
self-contained systems with massive databases run on
mainframe computers from a central location.
This method of system development tended to ensure
that data design was consistent (thus data were sharable)
within that large system. The need for sharing data across
these large “legacy” systems, however, while important,
was not critical since each generally performed a different
and completely independent function.
As computer technology has advanced, we are moving
away from the centralized mainframe environment to one
that is highly distributed. Advancing technology is
effectively removing a discipline previously imposed by the
size and expense of mainframe computers.
We are seeing the appearance of multiple systems built
at different echelons that perform similar functions and
track similar (sometimes even the same) data. But, again,
the focus of each is usually exclusive to the one function it is
to perform, at the expense of interoperability. In this new
distributed environment, it is becoming absolutely critical
to design information systems that can share data.
The 1993 Army Enterprise Strategy specifically
mandates that “all information systems will use Army
139
standard data elements. This will increase the accuracy and
timeliness of the data, increasing interoperability during all
operations.”4
The Director of the Defense Information Systems
Agency has stated, “There is no greater imperative than to
deliver to warfighters fully integrated systems that provide
[a] fused, real-time, ground truth picture of the
battlespace.”5 The goal is clear and relatively simple.
Developing a method to achieve it is another matter.
THE FLAW IN OUR CURRENT ACQUISITION
PARADIGM
Why is building information systems that share data so
hard? A great deal of the problem has to do with the way we
acquire data. DoD and service information systems are built
using the standard DoD acquisition model. Each major
system is, for the most part, developed independently by a
program manager (PM) who is provided reasonable
autonomy and held responsible for progress in system
development and fielding. The PM’s primary motivation is
delivery of a system on time and within budget. While the
PM undoubtedly desires interoperability with other
systems, there is little hope of coordinating the system
design with every other system that may someday require
interface.
DoD fu n din g mec hani sms f oc us nar r owl y on
independent systems. As Admiral Owens points out, “We
have cultivated a planning, programming, and budgeting
system [PPBS] that tends to handle programs as discrete
entities. The PPBS cycle forces us into a compartmentalized
perspective.”6
Thus, DoD’s acquisition system is really designed to
optimize the efficiency and effectiveness of individual
systems at the expense of developing (or even allowing the
development of) systems of systems with their promised
synergistic performance.
140
The Method: How We Build “Watches” Now.
To illustrate why we are where we are (having spent
billions of dollars constructing sophisticated information
systems which, for the most part, do not interoperate), we
need to review how we design and build information
systems. Figure 4 shows the typical “waterfall”
development model used to build software during the
mainframe era.7 Figure 5 shows the newest software
development lifecycle model approved as part of DoD’s
Military Standard 498. Both are process- or functioncentered models. If one envisions a pie representing all
functions performed across the services, these models take a
slice of that pie and automate the functions within (possibly
a very small part of) that slice (see Figure 6). A portion of the
development effort involves designing the system
database—or building a system data architecture.
Take the Standard Installation/Division Personnel
System, for example, or substitute your favorite system
Operational
Requirements
System
Requirements
Software
Rqts Analysis
Preliminary
Design
Detailed Design
Coding
and Unit Testing
Software
Integration
System Integration
System Testing
Figure 4.
The Waterfall Life Cycle Model.
141
142
Operational
Concept
Description
Description
SoftwareTest
Report
CSCI
Quality
Testing
System
Quality
CSCI/HWCI Test
Integration & SoftwareTest
Description
Test
and Report
Basic Software Development Model Depicted in Mil Standard 498
Hardware Configuration (HWCI) Development
(not covered by Mil Std 498)
Software, Interface,
& Database Design
Descriptions
Software
Design
Software &
Interface
Requirements Specs
Software
Requirements
Analysis
Computer Software Configuration Item (CSCI) #2
Unit
Software
Integration/
Implement- Testing
ation/Testing SoftwareTest
Software
Test Report
CSCI
Quality
Testing
Executable Software
Source Files
Software Version
Descriptions
Software Product
Specifications
Update System/
Subsystem Design
Descriptions
Support Manuals
Prepare for
Software
Transition
Executable Software
Software Version
Descriptions
User/Operator
Manuals
Prepare for
Software
Use
Software Installation Plan/Software Transition Plan
Figure 5. Military Standard 498 Software Development Cycle.
Software
Design
Description
System/
Subsystem
Specs
Interface
Requiements
Specs
System
Requirements
Analysis
System
Design
Software &
& Database Design
Interface
Descriptions
Requirements Specs
Software
Software
Requirements Design
Analysis
Software Interface,
Unit
Software
Integration/
Implement- Testing
ation/Testing
Software Test
Description
SoftwareTest Plan
Computer Software Configuration Item (CSCI) #1
Software Development Plan
Project Planning and Oversight
Air & Space
Defense
Intelligence
Finance
Force
Protection
Personnel
Maneuver
Logistics
Fires
C2
Figure 6.
The Functional Pie: Illustrative Slices.
here. Under these models we would conduct a thorough
analysis of all the processes involved in managing personnel
at divisions and installations. Based on that analysis, we
would develop a set of requirements to automate these
processes, a data architecture for the system, and
ultimately a detailed design to automate these processes.
The Problem With the Single System Focus.
From its genesis, the entire system is narrowly oriented
on the slice of pie involving one particular function (in this
case, personnel management), inherently driving the
system developer into a stovepipe. Once the system
developer is given his charter (“Go forth and automate
function xyz.”), our system development models effectively
call for him to concentrate within that narrow lane. There is
no construct in the formal models that causes the PM to look
143
outside his lane and integrate his system with others. There
are no provisions in these models that compel a system
developer to design interoperability into the system. In fact
Military Standard 498, which is just over two years old, does
not even mention interoperability of data. Thus,
interoperability is typically handled as an adjunct to
building the basic system.
If the PM strictly followed the formal system
development models, he or she might well have fully
developed the system’s data architecture before even
considering interoperability.
OPTIONS FOR ACHIEVING AN INTEROPERABLE
DATA ENVIRONMENT
There are at least three general courses of action DoD
could pursue in developing systems which could freely
exchange data. It could centralize all systems development
efforts under one organization within DoD. It could
continue to allow decentralized development while insisting
developers adhere to strict interoperability standards. Or it
could change the acquisition method by making system
development a joint effort between the system developer
and an organization responsible for development of an
enterprise data architecture. Each of these options is
discussed in more detail below.
Centralize: Develop Systems only at the DoD/Joint
Level.
Under this “massive centralization” course of action,
system development efforts and expertise reside in a central
department under DoD. This agency would be responsible
for development of all new information systems within DoD.
It would implement rules and procedures to ensure that
systems interoperability was developed.
144
Standardize: Remain Decentralized but Build and
Enforce Standards.
DoD has commonly called this the “data standardization
program.” It is the course of action both DoD and the Army
have been pursuing in some form for at least the last 30
y ea rs. 8 T h e persi s tent and wi d es p r ead l ac k of
interoperability within DoD systems today would seem to
indicate that this course of action is just not working.9
Th e C on cept . Data stand ar d i zati on c al l s f or
development and implementation of technical and data
interoperability standards to which system development
efforts would be held. Data standards are centered around
an enterprise data architecture (data model) and uniformly
defined pieces of data called “standard data elements.”
These are kept in a repository, or dictionary, which would be
universally available to system developers.
In theory, system designers could go to the dictionary
and pull out the “standard” definition for any DoD data and
use that in their design. Under the current guidance, if the
developer does not find a suitable standard to use, he or she
is then responsible for developing a proposed standard and
submitting it to the DoD Data Administrator for approval.10
In this manner, the DoD enterprise data architecture is
supposed to be developed over time as new systems are
built.
The Fallacy of Standard Data. The word “standard”
evokes an image of a set of rules, protocols, or specifications
which rarely change over time and need little periodic
maintenance. Unfortunately, construction of an enterprise
data architecture is a massive project requiring significant
development effort and considerable upkeep.
Database design is a major portion of the development
effort on behalf of any information system. Developing an
enterprise data architecture is, in essence, the construction
of a high level data design for every functional area in the
enterprise. It is more an engineering effort than one of
145
developing a standard, and, while a system’s data
architecture is relatively fixed compared to other system
components, it can change over time. Thus calling it a
standard can be deceiving.
The implication behind the data standardization
program is that at some point the data architecture will be
“finished.” However, experience during the Army’s data
modeling efforts in the early 1990s showed that as new
functional areas were modeled, inconsistencies, oversights,
and errors were consistently revealed in the existing data
architecture.
The current DoD Data Model, which is relatively young,
has 3,453 entities, with another 5,000 under development.
The DoD Data Dictionary System, which is used to store
DoD standard data elements, has 23,658 elements
approved, proposed, or under development to date. 11
Obviously, as future information systems are developed, the
data model and the number of required standard data
elements will grow.
As with most engineering products, the utility of any
data architecture is highly dependent on its quality. If it
fails to accurately represent the entities and business
practices of an enterprise, it will not support construction of
useful information systems. Unfortunately, once a data
architecture is defined and systems are built to its
specification, it becomes an expensive proposition to change
the architecture upon discovery of an error. Thus,
development of an accurate, high-quality data architecture
from the start is crucial.
Determining the correct entities, relationships, and
business rules for a large data architecture is an
exceptionally difficult mental drill. Managers who
participate in data modeling sessions often find themselves
rigorously defining their business practices and realizing
they have never really done so before.
146
A PM, whose primary motivation is delivery of a system,
is unlikely to take the care desired in developing his portion
of the enterprise data architecture. With this method, the
potential for developing a high-quality enterprise
architecture is quite poor.
COMBINE CENTRALIZATION
AND STANDARDIZATION
The third possible course of action is to modify the DoD
acquisition paradigm by effectively incorporating the
essentials of the two previous options, but with a major
difference in focus. This course of action splits development
strategy for information systems into two parts.
Development of the data architecture would be done
centrally, while allowing the remainder of system
development to stay decentralized.
The Concept.
Under this approach, the enterprise data architecture
would be viewed as a major engineering project, not a set of
standards. DoD would fund, build, and maintain a data
architecture as a major system development effort. Unlike
most development projects, however, the product would not
be a system designed for end users. It would instead be a
system built exclusively to support other information
system development efforts. In essence, this approach
advocates construction of DoD’s enterprise data
architecture as a large infrastructure project that provides
a foundation upon which end user information systems are
built (see Figure 7).
A necessary step in this process would be development of
a comprehensive information system designed to support
construction of the data architecture. This system would be
a type of Computer-Aided Software Engineering (CASE)
tool designed to assist users in navigating and modifying
the data architecture. It would also assist system
147
Air & Space
Defense
Intelligence
Finance
Force
Protection
Enterprise
Data
Architecture
Personnel
Maneuver
Logistics
Fires
C2
Data Architecture at the Core of Systems Development
Figure 7.
Enterprise Data Architecture.
developers in incorporating the architecture into new
information system design.
This approach would also recognize the inevitable need
to maintain the data architecture over the long term. An
organization’s data needs and business practices will
change (usually slowly) over time. If the data architecture
doesn’t change with the organization, it becomes obsolete
and ultimately useless.
To retain its utility, the architecture would have to be
modified periodically. This modification must be closely
controlled to ensure components of the architecture
(models, data elements, etc.) remain consistent.
Mechanisms must also be built which eventually cascade
changes in the enterprise data architecture down to existing
information systems.
148
The Organization.
Under this approach, we would charter a high level office
at Office of the Secretary of Defense or Joint Staff level to
ensure that DoD’s data architecture would be centrally
developed and maintained by an organization charged with
assisting information system developers in using the
enterprise data architecture to design and build new
systems. A proposed organization appears at Figure 8.
DoD
Data Manager
Data Dictionary/
Respository/
CASE Tool
Maintenance Division
Design
Assistance
Division
Architecture
Management
Division
Model and Metadata
Branch
Functional Expert
Teams
PM A
Information
System
Design Team A
PM B
Functional Expert
Teams
Information
System
Design Team B
Figure 8.
Possible Layout for DoD Data Management
Organization.
The Dictionary/Repository division would be responsible
for maintaining the information system (CASE tool) in
which the architecture is kept. The Architecture
Management Division would continually update and
maintain the architecture to ensure its currency, quality,
and consistency. Teams of functional experts would be
149
responsible for portions of the architecture that fall into
their particular functional area.
The Design Assistance Division would be composed of
several design-build teams. Each design-build team would
work with an individual information system (IS) developer
during system development on a dedicated basis. The team
would assist the IS design-build team in database
specification, design, and development, and would monitor
and assist the PM as needed on all database redesign issues
through the entire life cycle of the program.
Building the Architecture.
As noted earlier, construction of the architecture would
clearly be a massive job in itself; however, it could be done
incrementally given the right organization and a consistent
funding stream. As design teams developed additions or
corrections to the architecture, the Architecture
Management Division could integrate them into the
enterprise architecture, ensuring they remained consistent
with existing portions.
While this approach to building an enterprise
architecture is similar to the approach DoD is currently
pursuing under the data standardization program, it differs
in that only the DoD Data Manager is responsible for the
architecture. The DoD Data Manager’s focus is primarily on
development of a high-quality, consistent enterprise
architecture. The PM, on the other hand, can focus on
building a system without having to devote his or her
resources toward building the enterprise architecture.
Advantages and Disadvantages.
This approach could have several advantages over our
current standardization approach. It removes the burden of
developing an architecture from the PM and places it on an
organization designed and staffed to do that job.
Design-build teams would be fully familiar with the
150
enterprise architecture, and new projects could
immediately take advantage of existing protocols and apply
them to new development efforts. It also means they could
quickly identify omissions, inconsistencies, or errors in the
enterprise architecture and work to get them corrected.
Finally, quality, consistency, and integrity should be
considerably better than one developed by multiple
organizations.
However, there are clearly some tough issues that must
be addressed with this “team” approach to information
systems development. The fundamental change from the
PM’s point of view is that he or she would no longer have
exclusive control over the database design team. Database
design would instead be a joint effort between the PM’s
office and a DoD design-build team.
Design-build teams would initially require time to
become familiar with the specific project. There is no reason
to believe they would require significantly more time than
any normal development team starting a project, however.
Despite these challenges, this approach offers
considerable promise. It explicitly recognizes the need to
undertake a major infrastructure-type project to build and
maintain a high-quality enterprise data architecture. It
provides for an organization to do so. It provides tools and
personnel to assist the system developer in building new
information systems. And it promises true DoD-wide data
interoperability and potential long-term cost savings.
POTENTIAL BENEFITS OF AN INTEROPERABLE
DATA ENVIRONMENT
DoD-wide data interoperability, in turn, would provide a
common shared data environment across DoD. The
potential benefits of such a common data environment are
extraordinary.
Systems compatible with the DoD enterprise data
architecture could, in theory, freely pass data between
151
themselves without translation and with assurance that
definitions behind the data are common. This “complete
interoperability” would make it possible to build systems of
systems without having to modify the underlying functional
information systems and without having to build
translators.
A fully developed DoD data architecture also promises to
eliminate significant portions of individual system
development efforts, since much of the database definition
within any functional area would already exist. In fact,
given new CASE tools, one could envision database design
being done by merely selecting the desired entities,
relationships, and attributes from an already-constructed
DoD data model.
This shared data environment would also facilitate
development of truly reusable software. Both the Army and
DoD have long pursued a goal of establishing a repository to
maintain reusable software modules. This goal has eluded
them largely because software operates on data, and, if two
systems design their data definitions differently, they
generally cannot use the same software. Interoperable data
promises to make reusable software a viable possibility.
The ultimate goal for an enterprise data architecture
could be the development of an integrated system of
functional on-line databases. Given the near universal
accessibility that internet technology provides, developing
an information system in the future could be no more
complicated than forming a series of queries against these
already existing databases.
CONCLUSION
The potential advantages that integrated systems of
systems offer truly are synergistic. Unfortunately, our
current acquisition model inhibits the development of
systems which can freely share data and interoperate. If
DoD is to develop interoperable systems, we should fund
and undertake a major development effort to build an
152
enterprise data architecture. We must staff an organization
of experts responsible for the maintenance of this
architecture. Further, we should alter our acquisition model
such that database design and development occur jointly
between the PM’s office and the organization responsible for
the DoD enterprise architecture.
In the words of the Honorable Emmett Paige, Assistant
Secretary of Defense (C3I):
Information that is part of a shared integrated information
database, accessible by a wide user base that can collaborate,
has tremendous value. The rapid pace of technological
advance, coupled with an unpredictable world situation,
demands that we pursue this goal with all deliberate speed.12
ENDNOTES - CHAPTER 7
1. Army Chief of Staff, Army Vision 2010, Washington, DC: U.S.
Department of the Army, 1996, p. 17.
2. Chairman of the Joint Chiefs of Staff, Joint Vision 2010,
Washington, DC: Chairman of the Joint Chiefs of Staff, 1996, p. 16.
3. Ibid., p. 19.
4. Department of the Army, “Army Enterprise Strategy, The
Vision,” Washington: U.S. Department of the Army, Office of the
Secretary of the Army, DISC4, July 20, 1993, p. 22.
5. Defense Information Systems Agency Memorandum for
Program Managers and Developers, “Implementing DoD Standard
Data Elements,” April 1996, p. 1.
6. William A. Owens, “Emerging Systems of Systems,” U.S. Naval
Institute Proceedings, Vol. 121, No. 5, May 1995, p. 36.
7. The model shown in Figure 3 is taken from Major Paul D. Condit,
USAF, Principles of Information Resource Management: A Foundation
for the Future, research report, Maxwell Air Force Base, AL: Air
University Press, 1992, p. 40.
8. U.S. Department of Defense, Data Elements and Data Codes
Standardization Program, DoD Directive 5000.11, dated December 7,
153
1964 (since rescinded). DoD Directive 8320.1, DoD Data
Administration, September 26, 1991, replaced this document.
9. John G. Roos, “Ending the C4I Tunnel of Babel,” Armed Forces
Journal, Vol. 132, No. 3, October 1994, P. 19. Mr. Roos states that
“decades of independent technical and procurement decisions have left
the services with a hodgepodge of command, control, computer, and
intelligence, C4I systems, making it difficult—in some cases
impossible—to communicate across service lines. The problem has been
obvious for years.” See also Peter Rackham, “Uniting the Tower of
Babel,” Jane’s Defence Weekly, Vol. 22, No. 16, October 22, 1994, p. 26.
Mr. Rackham states that “the U.S. Department of Defense operates the
world’s most diverse array of information systems with a vast collection
of computer architectures, operating systems, hardware, programming
languages, software applications, database languages, and protocols.
While each information system was designed to do a particular task,
many perform similar functions and yet few can interoperate or share
data.”
10. DISA Memorandum.
11. Pam Baylon, Information on number of entities in the DoD Data
Model and number of data elements in the DDDS provided by electronic
mail message <baylonp@ncr.disa .mil>, subject: “DoD Data Model,” to
Lieutenant Colonel W. Lasher <lasherw@carlisle-emh2.army.mil>,
March 19, 1997.
12. Emmett Paige, Jr., “Achieving the Integrated Systems
Concept,” Keynote address at the Armed Forces Communications and
Electronics Association International Technet 1996 Convention,
Washington, DC, June 4, 1996, as published in Defense Issues, Vol. 11,
No. 51, June 1996, p. 5.
154
ABOUT THE AUTHORS
BILLY WELLS graduated and was commissioned in the
Infantry from Mississippi State University in 1975.
Lieutenant Colonel Wells has served at almost every level of
Infantry assignment including command of the 3rd
Battalion, 15th Infantry. He served successively as Chief,
Doctrine Division, and as Chief, FORCE XXI Office, U.S.
Army Infantry School, prior to attending the U.S. Army War
College.
BARBARA JEZIOR graduated from the University of
Rhode Island with a B.A. degree in German in 1976. Ms.
Jezior subsequently took a masters degree in psychology
from Fitchburg University in 1983. Beginning her
government career as an Instructor at the U.S. Army
Intelligence School, she served as a Research Psychologist
and Project Officer at Natick Research, Development and
Engineering Center; then as a Systems Integrator in the
Office of the Deputy Chief of Staff for Operations. She
returned to Natick as Chief, Consumer Resource Branch,
then went back to the Pentagon as a Program Analyst in the
Office of the Secretary of the Army for Research,
Development and Acquisition. Prior to her assignment to
the U.S. Army War College, she was Director, Plans and
Operations Division, Soldier Systems Command, Natick.
ARTHUR SOSA graduated from the University of West
Plattville in 1971 with a B.S. degree in science and biology.
Lieutenant Colonel Sosa returned to that university and
took a masters degree in counseling in 1977. An Army
National Guard officer, he was commissioned in Aviation
and has served in a variety of aviation assignments
including command of the 1st Battalion, 147th Aviation,
Wisconsin National Guard, just prior to attending the U.S.
Army War College.
155
GARY J. MOTSEK, an Ordnance officer, currently
commands Pine Bluff Arsenal. He graduated from Syracuse
University in 1974 with a B.S. in engineering. Colonel
Motsek took a masters degree in management from Troy
State University in 1982, and attended the U.S. Army
Command and General Staff College in 1984. He has served
in Field Artillery, Ordnance, and Maintenance units,
commanding successively the NATO Support Activity,
Brussels, Belgium, and the 15th Ordnance Battalion,
Muenster, Germany. Prior to attending the U.S. Army War
College, he was a Joint Staff Officer, J-4, the Joint Staff.
YVES FONTAINE is an Ordnance Corps officer currently
assigned as G-4, 101st Airborne Division (Airmobile). He
graduated from La Salle College with a B.S. degree in
business in 1975. Lieutenant Colonel Fontaine took a
masters degree from Webster University in business in
1989. Following attendance at the U.S. Army Command
and General Staff College and the School of Advanced
military Studies, he was awarded a master of military arts
and science degree in 1990. He has served in Maintenance
and Ordnance units in the United States, Germany, and
Belgium and commanded the 82nd Forward Support
Battalion, 82nd Airborne Division, immediately prior to
attending the U.S. Army War College.
PAUL T. HENGST graduated and was commissioned in the
Signal Corps from the United States Military Academy in
1977. Lieutenant Colonel Hengst took a masters degree in
information systems from the Naval Postgraduate School in
1987 and attended the U.S. Army Command and General
Staff College in 1990. He has served in a variety of Signal
Corps assignments including command of the 112th Signal
Battalion prior to his attendance at the U. S Army War
College.
WILLIAM T. LASHER graduated from the United States
Military Academy with a B.S. degree in engineering in 1977.
Lieutenant Colonel Lasher went on to take a masters degree
in computer science from the University of Texas in 1988,
156
following which he attended the U.S. Army Command and
General Staff College. He has served in a variety of Signal
Corps assignments including duty in Somalia and Haiti.
Just prior to attending the U.S. Army War College, he
commanded the 125th Signal Battalion, 25th Infantry
Division.
DOUGLAS V. JOHNSON II graduated from the United
States Military Academy in 1963, took his masters degree
from University of Michigan in 1973 and his doctorate from
Temple University in 1992, both in history. He attended the
U.S. Army Command and General Staff College in 1974, to
which he returned in 1981 where he became co-founder of
the School of Advanced Military Studies. Retiring in 1992
after 30 years service as an artilleryman, Dr. Johnson is
currently an Associate Research Professor, National
Security Affairs, and directs the USAWC Army After Next
Seminar.
157
U.S. ARMY WAR COLLEGE
Major General Robert H. Scales, Jr.
Commandant
*****
STRATEGIC STUDIES INSTITUTE
Director
Colonel Richard H. Witherspoon
Director of Research
Dr. Earl H. Tilford, Jr.
Authors
Lieutenant Colonel Yves J. Fontaine
Lieutenant Colonel Paul T. Hengst
Ms. Barbara A. Jezior
Lieutenant Colonel William T. Lasher
Colonel Gary J. Motsek
Lieutenant Colonel Arthur J. Sosa
Lieutenant Colonel Billy E. Wells, Jr.
Editor
Dr. Douglas V. Johnson II
Director of Publications and Production
Ms. Marianne P. Cowling
Publications Assistant
Ms. Rita A. Rummel
*****
Composition
Mrs. Mary Jane Semple
Cover Artist
Mr. James E. Kistler
Download